Development of vulnerability mining techniques for processor trusted execution environments

YAO Wenjun, LV Yongqiang, SUN Yanbin, WU Guodong, TIAN Zhihong

Integrated Circuits and Embedded Systems ›› 2024, Vol. 24 ›› Issue (9) : 1-6.

PDF(2261 KB)
PDF(2261 KB)
Integrated Circuits and Embedded Systems ›› 2024, Vol. 24 ›› Issue (9) : 1-6. DOI: 10.20193/j.ices2097-4191.2024.0024
Special Topic of Integrated Circuits Hardware Security

Development of vulnerability mining techniques for processor trusted execution environments

    {{javascript:window.custom_author_en_index=0;}}
  • {{article.zuoZhe_EN}}
Author information +
History +

HeighLight

{{article.keyPoints_en}}

Abstract

{{article.zhaiyao_en}}

Key words

QR code of this article

Cite this article

Download Citations
{{article.zuoZheEn_L}}. {{article.title_en}}[J]. {{journal.qiKanMingCheng_EN}}, 2024, 24(9): 1-6 https://doi.org/10.20193/j.ices2097-4191.2024.0024

References

References

{{article.reference}}

Funding

RIGHTS & PERMISSIONS

{{article.copyrightStatement_en}}
{{article.copyrightLicense_en}}
PDF(2261 KB)

Accesses

Citation

Detail

Sections
Recommended

/