Login / Signup
LeakageFreeSpec: Applying the Wiping Approach to Defend Against Transient Execution Attacks.
Fahong Yu
Zhimin Tang
Xiaobo Li
Zhihua Fan
Published in:
CF (2024)
Keyphrases
</>
steady state
databases
watermarking scheme
countermeasures
image watermarking
chosen plaintext