Locking down insecure indirection with hardware-based control-data isolation.
William ArthurSahil MadekaReetuparna DasTodd M. AustinPublished in: MICRO (2015)
Keyphrases
- data sets
- data acquisition
- data analysis
- data processing
- database
- synthetic data
- data structure
- statistical analysis
- image data
- data collection
- end users
- data points
- small number
- fine granularity
- raw data
- missing data
- input data
- low cost
- prior knowledge
- high quality
- real time
- data sources
- control system
- relational databases
- data distribution
- training data
- original data
- computing power