Login / Signup
Reliable Rowhammer Attack and Mitigation Based on Reverse Engineering Memory Address Mapping Algorithms.
Saeyoung Oh
Jong Kim
Published in:
WISA (2018)
Keyphrases
</>
reverse engineering
memory requirements
computational complexity
memory usage
learning algorithm
object oriented
software maintenance
business rules
dynamic analysis
software product