Login / Signup
BeeBox: Hardening BPF against Transient Execution Attacks.
Di Jin
Alexander J. Gaidis
Vasileios P. Kemerlis
Published in:
USENIX Security Symposium (2024)
Keyphrases
</>
security protocols
security mechanisms
steady state
neural network
operating system
data hiding
computer security