IMSC: Instruction set architecture monitor and secure cache for protecting processor systems from undocumented instructions

Abstract A secure processor requires that no secret, undocumented instructions be executed. Unfortunately, as today's processor design and supply chain are increasingly complex, undocumented instructions that can execute some specific functions can still be secretly introduced into the processo...

Full description

Bibliographic Details
Main Authors: Yuze Wang, Peng Liu, Yingtao Jiang
Format: Article
Language:English
Published: Hindawi-IET 2022-07-01
Series:IET Information Security
Subjects:
Online Access:https://doi.org/10.1049/ise2.12059