Login / Signup
Bypassing memory safety mechanisms through speculative control flow hijacks.
Andrea Mambretti
Alexandra Sandulescu
Alessandro Sorniotti
William K. Robertson
Engin Kirda
Anil Kurmus
Published in:
CoRR (2020)
Keyphrases
</>
control flow
data flow
memory hierarchy
software testing
process model
transition systems
workflow management systems
business process models
modeling language
secondary storage
database
main memory
artificial intelligence
databases
memory requirements
reactive systems
high level