Login / Signup
The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks.
David Molnar
Matt Piotrowski
David Schultz
David A. Wagner
Published in:
ICISC (2005)
Keyphrases
</>
automatic detection
control flow
security model
data flow
access control
public key
security requirements
security analysis
smart card
process model
automatically detecting
software testing
workflow management systems
authentication and key agreement
modeling language
information systems
test cases
case study