Login / Signup
Survey of Transient Execution Attacks and Their Mitigations.
Wenjie Xiong
Jakub Szefer
Published in:
ACM Comput. Surv. (2021)
Keyphrases
</>
countermeasures
steady state
security threats
watermarking scheme
plan generation
execution model
search engine
case study
markov chain
access control
information security
traffic analysis
security risks
denial of service attacks
data corruption