Abstract
The increasing complexity of modern computing devices has rendered security architectures vulnerable to recent side-channel and transient-execution attacks. We discuss the most relevant defenses as well as their drawbacks and how to overcome them for next-generation secure processor design.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have