![](https://img-blog.csdnimg.cn/20201014180756927.png?x-oss-process=image/resize,m_fixed,h_64,w_64)
文献
文章平均质量分 96
diamond_biu
day day up!
展开
-
Spectre Attacks: Exploiting Speculative Execution. 2019
Spectre Attacks: Exploiting Speculative Execution来源梳理摘要I INTRODUCTIONA. Our resultB. Our TechniquesVariant 1: Exploiting Conditional BranchesVariant 2: Exploiting Indirect BranchesOther VariantsC. Targeted Hardware and Current StatusII. BACKGROUNDA. Out-of原创 2022-03-18 18:07:24 · 3000 阅读 · 0 评论 -
RISC-V BOOM核学习
来源:RISC-V BOOM documentationRISC-V BOOM核学习The Berkeley Out-of-Oder MachineINTRODUCTIONRV64GCFig. 1 Detailed BOOM Pipeline. ’s denote where the core can be configured.The BOOM PiplineFig. 2 Simplified BOOM Pipeline with StagesBOOM为10级流水线,实际实现为7级:(原创 2022-02-14 01:11:45 · 5384 阅读 · 0 评论 -
Imprecise Security: Quality and Complexity Tradeoffs for Hardware Information Flow Tracking.2016
来源W. Hu, A. Becker, A. Ardeshiri, Y . Tai, P. Ienne, D. Mu, and R. Kastner. Imprecise Security: Quality and Complexity Tradeoffs for Hardware Information Flow Tracking[C], IEEE/ACM International Conference on Computer-Aided Design (ICCAD), Article 95, Nov原创 2020-10-30 22:06:23 · 466 阅读 · 2 评论 -
Information Flow Tracking in RISC-V.2019
来源G. Shirley and F. Saqib. Information Flow Tracking in RISC-V[C], 2019 IEEE 16th International Conference on Smart Cities: Improving Quality of Life Using ICT & IoT and AI (HONET-ICT), Charlotte, NC, USA, 2019, pp. 199-200, doi: 10.1109/HONET.2019.89原创 2020-10-14 14:50:18 · 319 阅读 · 0 评论 -
Theoretical Analysis of Gate Level Information Flow Tracking.2010
论文信息:Jason Oberg, Wei Hu, Ali Irturk, Mohit Tiwari, Timothy Sherwood, and Ryan Kastner. Theoretical Analysis of Gate Level Information Flow Tracking, ACM/EDAC/IEEE Design Automation Conference (DAC), 244-247, Jun. 2010.梳理1.INTRODUCTIONInformation flow原创 2020-10-13 22:16:31 · 339 阅读 · 0 评论