Login / Signup
Enlisting Hardware Architecture to Thwart Malicious Code Injection.
Ruby B. Lee
David K. Karig
John Patrick McGregor
Zhijie Shi
Published in:
SPC (2003)
Keyphrases
</>
hardware architecture
malicious code
static analysis
reverse engineering
hardware implementation
network traffic
hardware architectures
source code
associative memory
processing elements
signal processing
general purpose
block matching motion estimation