Abstract: The security of computer systems typically relies on a hardware root of trust. As vulnerabilities in hardware can have severe implications on a system, there is a need for techniques to ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results