Login / Signup
PoisonIvy: Safe speculation for secure memory.
Tamara Silbergleit Lehman
Andrew D. Hilton
Benjamin C. Lee
Published in:
MICRO (2016)
Keyphrases
</>
memory usage
memory requirements
low memory
key management
limited memory
real time
lightweight
identity management
security level
memory management
memory space
key exchange protocol
database
standard model
security mechanisms
random access
computing power
security issues
sensor networks
data sets