Login / Signup

Reliable Rowhammer Attack and Mitigation Based on Reverse Engineering Memory Address Mapping Algorithms.

Saeyoung OhJong Kim
Published in: WISA (2018)
Keyphrases
  • reverse engineering
  • memory requirements
  • computational complexity
  • memory usage
  • learning algorithm
  • object oriented
  • software maintenance
  • business rules
  • dynamic analysis
  • software product