Demystifying Pointer Authentication on Apple M1.
Zechao CaiJiaxun ZhuWenbo ShenYutian YangRui ChangYu WangJinku LiKui RenPublished in: USENIX Security Symposium (2023)
Keyphrases
- data structure
- biometric authentication
- user authentication
- image authentication
- authentication scheme
- semi fragile watermarking
- authentication mechanism
- keystroke dynamics
- identity management
- authentication protocol
- security analysis
- case study
- decision trees
- machine learning
- identity authentication
- data mining
- real world
- factor authentication
- fragile watermarking
- neural network