Oct. 4, 2022, 1:20 a.m. | Gino A. Chacon, Charles Williams, Johann Knechtel, Ozgur Sinanoglu, Paul V. Gratz

cs.CR updates on arXiv.org arxiv.org

As industry moves toward chiplet-based designs, the insertion of hardware
Trojans poses a significant threat to the security of these systems. These
systems rely heavily on cache coherence for coherent data communication, making
coherence an attractive target. Critically, unlike prior work, which focuses
only on malicious packet modifications, a Trojan attack that exploits coherence
can modify data in memory that was never touched and is not owned by the
chiplet which contains the Trojan. Further, the Trojan need not even …

cache hardware systems threats trojan

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

EY GDS Internship Program - SAP, Cyber, IT Consultant or Finance Talents with German language

@ EY | Wrocław, DS, PL, 50-086

Security Architect - 100% Remote (REF1604S)

@ Citizant | Chantilly, VA, United States

Network Security Engineer - Firewall admin (f/m/d)

@ Deutsche Börse | Prague, CZ

Junior Cyber Solutions Consultant

@ Dionach | Glasgow, Scotland, United Kingdom

Senior Software Engineer (Cryptography), Bitkey

@ Block | New York City, United States