Login / Signup

LeakageFreeSpec: Applying the Wiping Approach to Defend Against Transient Execution Attacks.

Fahong YuZhimin TangXiaobo LiZhihua Fan
Published in: CF (2024)
Keyphrases
  • steady state
  • databases
  • watermarking scheme
  • countermeasures
  • image watermarking
  • chosen plaintext