IMSC: Instruction set architecture monitor and secure cache for protecting processor systems from undocumented instructions
Abstract A secure processor requires that no secret, undocumented instructions be executed. Unfortunately, as today's processor design and supply chain are increasingly complex, undocumented instructions that can execute some specific functions can still be secretly introduced into the processo...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-IET
2022-07-01
|
Series: | IET Information Security |
Subjects: | |
Online Access: | https://doi.org/10.1049/ise2.12059 |