ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1912.04870
  4. Cited By
V0LTpwn: Attacking x86 Processor Integrity from Software

V0LTpwn: Attacking x86 Processor Integrity from Software

10 December 2019
Zijo Kenjar
Tommaso Frassetto
David Gens
Michael Franz
A. Sadeghi
ArXivPDFHTML

Papers citing "V0LTpwn: Attacking x86 Processor Integrity from Software"

11 / 11 papers shown
Title
Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and ARM
  SoCs
Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and ARM SoCs
Hritvik Taneja
Jason Kim
Jie Xu
S. V. Schaik
Daniel Genkin
Y. Yarom
30
28
0
22 May 2023
TuRaN: True Random Number Generation Using Supply Voltage Underscaling
  in SRAMs
TuRaN: True Random Number Generation Using Supply Voltage Underscaling in SRAMs
Ismail Emir Yüksel
Ataberk Olgun
Behzad Salami
F. N. Bostanci
Yahya Can Tugrul
A. G. Yaglikçi
Nika Mansouri-Ghiasi
O. Mutlu
Oguz Ergin
16
2
0
20 Nov 2022
BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced
  Taint Tracking
BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking
Hossam ElAtali
Lachlan J. Gunn
Hans Liljestrand
Nadarajah Asokan
31
4
0
20 Apr 2022
DeepSteal: Advanced Model Extractions Leveraging Efficient Weight
  Stealing in Memories
DeepSteal: Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories
Adnan Siraj Rakin
Md Hafizul Islam Chowdhuryy
Fan Yao
Deliang Fan
AAML
MIACV
42
111
0
08 Nov 2021
Chunked-Cache: On-Demand and Scalable Cache Isolation for Security
  Architectures
Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures
Ghada Dessouky
Alexander Gruler
Pouya Mahmoody
A. Sadeghi
Emmanuel Stapf
34
22
0
15 Oct 2021
Garmr: Defending the gates of PKU-based sandboxing
Garmr: Defending the gates of PKU-based sandboxing
Alexios Voulimeneas
Jonas Vinck
Ruben Mechelinck
Stijn Volckaert
11
0
0
10 Oct 2021
FooBaR: Fault Fooling Backdoor Attack on Neural Network Training
FooBaR: Fault Fooling Backdoor Attack on Neural Network Training
J. Breier
Xiaolu Hou
Martín Ochoa
Jesus Solano
SILM
AAML
41
8
0
23 Sep 2021
Extending On-chain Trust to Off-chain -- Trustworthy Blockchain Data
  Collection using Trusted Execution Environment (TEE)
Extending On-chain Trust to Off-chain -- Trustworthy Blockchain Data Collection using Trusted Execution Environment (TEE)
Chunchi Liu
Hechuan Guo
Minghui Xu
Shengling Wang
Dongxiao Yu
Jiguo Yu
Xiuzhen Cheng
35
42
0
30 Jun 2021
SERVAS! Secure Enclaves via RISC-V Authenticryption Shield
SERVAS! Secure Enclaves via RISC-V Authenticryption Shield
Stefan Steinegger
David Schrammel
Samuel Weiser
Pascal Nasahl
Stefan Mangard
27
9
0
07 May 2021
Artificial Neural Networks and Fault Injection Attacks
Artificial Neural Networks and Fault Injection Attacks
Shahin Tajik
F. Ganji
SILM
13
10
0
17 Aug 2020
SNIFF: Reverse Engineering of Neural Networks with Fault Attacks
SNIFF: Reverse Engineering of Neural Networks with Fault Attacks
J. Breier
Dirmanto Jap
Xiaolu Hou
S. Bhasin
Yang Liu
17
53
0
23 Feb 2020
1