Login / Signup
Bypassing IOMMU Protection against I/O Attacks.
Benoît Morgan
Eric Alata
Vincent Nicomette
Mohamed Kaâniche
Published in:
LADC (2016)
Keyphrases
</>
input output
countermeasures
malicious users
malicious attacks
garbage collection
watermarking scheme
main memory
cyber attacks
denial of service attacks
watermarking algorithm
storage cost
watermarking technique
data transfer
data sets
intrusion detection system
digital images
database systems
data mining