Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

processor vulnerabilities

biblio

Visible to the public A red team blue team approach towards a secure processor design with hardware shadow stack

Submitted by grigby1 on Thu, 06/07/2018 - 3:02pm
  • private data access
  • Trusted Computing
  • software attacks
  • security of data
  • security
  • RISC-V
  • return oriented programming attack
  • Resiliency
  • resilience
  • reduced instruction set computing
  • red team blue team approach
  • pubcrawl
  • processor vulnerabilities
  • processor design security
  • processor architecture
  • composability
  • Payloads
  • openrisc
  • open processor architectures
  • object-oriented programming
  • object oriented security
  • Metrics
  • memory corruption
  • hardware-software codesign
  • hardware shadow stack
  • Hardware
  • embedded systems
  • embedded system security
  • Computer bugs
  • computer architecture

Terms of Use  |  ©2023. CPS-VO