Login / Signup
Tainted Secure Multi-Execution to Restrict Attacker Influence.
McKenna McCall
Abhishek Bichhawat
Limin Jia
Published in:
CCS (2023)
Keyphrases
</>
factor authentication
key management
security issues
genetic algorithm
learning algorithm
dynamic environments
factors influencing
standard model