Now showing items 1-2 of 2

    • Design Strategies for Efficient and Secure Memory 

      Lehman, Tamara Silbergleit (2019)
      Recent computing trends force users to relinquish physical control to unknown parties, making the system vulnerable to physical attacks. Software alone is not well equipped to protect against physical attacks. Instead software ...
    • Verification-Aware Processor Design 

      Lungu, Anita (2009)
      As technological advances enable computers to permeate many of our society's critical application domains (such as medicine, finances, transportation), the requirement for computers to always behave correctly becomes critical ...