Login / Signup
Reinforcing Meltdown Attack by Using a Return Stack Buffer.
Taehyun Kim
Youngjoo Shin
Published in:
IEEE Access (2019)
Keyphrases
</>
buffer overflow
malicious attacks
data corruption
buffer size
secret key
countermeasures
database systems
case study
wireless sensor networks
production system
image sequences
data sets
authentication protocol
buffer management
attack detection
malicious users
information retrieval
neural network