Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

ARMv8 A

biblio

Visible to the public More Secure Collaborative APIs Resistant to Flush+Reload and Flush+Flush Attacks on ARMv8-A

Submitted by grigby1 on Fri, 08/14/2020 - 11:44am
  • ARMv8-A processor
  • application programming interface
  • tablets
  • suspected Flush+Reload
  • static code analysis schemes
  • secure collaborative API
  • obfuscation techniques
  • mobile phones
  • Flush+Reload attack
  • Flush+Flush cache attacks
  • Flush+Flush attack
  • flush operation API
  • Collabo rative API
  • security of data
  • ARMv8 A
  • Compositionality
  • application program interfaces
  • APIs
  • program diagnostics
  • performance evaluation
  • cache storage
  • mobile computing
  • microprocessor chips
  • Resiliency
  • resilience
  • pubcrawl

Terms of Use  |  ©2023. CPS-VO