Login / Signup
Proofs or Remote Execution and Mitigation of TOCTOU Attacks.
Gene Tsudik
Published in:
AsiaCCS (2020)
Keyphrases
</>
countermeasures
malicious attacks
theorem proving
execution model
traffic analysis
data mining
anomaly detection
watermarking scheme
security mechanisms
formal proof
real time
information systems
smart card
computer security