FIPAC: Thwarting Fault- and Software-Induced Control-Flow Attacks with ARM Pointer Authentication.
Robert SchillingPascal NasahlStefan MangardPublished in: CoRR (2021)
Keyphrases
- control flow
- data flow
- java card
- software testing
- security mechanisms
- reactive systems
- process model
- modeling language
- transition systems
- workflow management systems
- semi fragile watermarking
- digital watermarking
- formal semantics
- data structure
- access control
- artificial intelligence
- security protocols
- watermarking scheme
- smart card
- business process models
- biometric template
- detect malicious
- information systems