PwIN - Pwning Intel piN: Why DBI is Unsuitable for Security Applications.
Julian KirschZhechko ZhechevBruno BierbaumerThomas KittelPublished in: ESORICS (1) (2018)
Keyphrases
- access control
- intrusion detection
- information security
- network security
- security issues
- neural network
- security requirements
- information assurance
- security systems
- security model
- security analysis
- security policies
- key management
- statistical databases
- security threats
- encryption scheme
- data security
- computer networks
- security level
- security measures
- search engine