Sign in

Moat: Verifying Confidentiality of Enclave Programs.

Rohit SinhaSriram K. RajamaniSanjit A. SeshiaKapil Vaswani
Published in: CCS (2015)
Keyphrases
  • access control
  • model checking
  • neural network
  • data sets
  • computer vision
  • information systems
  • hidden markov models
  • information security