Sign in

The Code That Never Ran: Modeling Attacks on Speculative Evaluation.

Craig DisselkoenRadha JagadeesanAlan JeffreyJames Riely
Published in: IEEE Symposium on Security and Privacy (2019)
Keyphrases
  • evaluation process
  • information retrieval
  • evaluation model
  • database systems
  • cooperative
  • evaluation method
  • modeling language
  • modeling method
  • security threats
  • terrorist attacks
  • attack detection
  • malicious code