Login / Signup

A Verification Methodology for the Arm® Confidential Computing Architecture: From a Secure Specification to Safe Implementations.

Anthony C. J. FoxGareth StockwellShale XiongHanno BeckerDominic P. MulliganGustavo PetriNathan Chong
Published in: Proc. ACM Program. Lang. (2023)
Keyphrases