Login / Signup

Tainted Secure Multi-Execution to Restrict Attacker Influence.

McKenna McCallAbhishek BichhawatLimin Jia
Published in: CCS (2023)
Keyphrases
  • factor authentication
  • key management
  • security issues
  • genetic algorithm
  • learning algorithm
  • dynamic environments
  • factors influencing
  • standard model