Login / Signup
Security Analysis of Processor Instruction Set Architecture for Enforcing Control-Flow Integrity.
Vedvyas Shanbhogue
Deepak Gupta
Ravi Sahita
Published in:
HASP@ISCA (2019)
Keyphrases
</>
security analysis
control flow
instruction set architecture
instruction set
data flow
public key
smart card
software testing
process model
floating point
security requirements
computer architecture
encryption scheme
workflow management systems
embedded systems
application specific