Login / Signup
Thwarting Control Plane Attacks with Displaced and Dilated Address Spaces.
Lauren Biernacki
Mark Gallagher
Valeria Bertacco
Todd M. Austin
Published in:
HOST (2020)
Keyphrases
</>
control system
control method
data acquisition
control strategy
digital images
computer security
control theory
malicious attacks