Control Flow and Pointer Integrity Enforcement in a Secure Tagged Architecture.
Ravi Theja GollapudiGokturk YuksekDavid DemiccoMatthew ColeGaurav KothariRohit KulkarniXin ZhangKanad GhoseAravind PrakashZerksis UmrigarPublished in: SP (2023)
Keyphrases
- control flow
- data flow
- data structure
- memory hierarchy
- reactive systems
- transition systems
- process model
- software architecture
- workflow management systems
- database
- real world
- software testing
- trusted computing
- integrity verification
- digital rights management
- sensitive data
- privacy preserving
- software development
- object oriented
- databases