Login / Signup
ATRIUM: Runtime attestation resilient under memory attacks.
Shaza Zeitouni
Ghada Dessouky
Orlando Arias
Dean Sullivan
Ahmad Ibrahim
Yier Jin
Ahmad-Reza Sadeghi
Published in:
ICCAD (2017)
Keyphrases
</>
countermeasures
memory requirements
data corruption
security threats
memory usage
malicious users
database systems
data structure
digital images
main memory
resource consumption
memory size
denial of service attacks
trusted computing
terrorist attacks