Picking a CHERI Allocator: Security and Performance Considerations.
Jacob BramleyDejice JacobAndrei LascuJeremy SingerLaurence TrattPublished in: ISMM (2023)
Keyphrases
- information security
- high security
- intrusion detection
- information assurance
- access control
- network security
- security issues
- security requirements
- security problems
- key management
- security properties
- information systems
- neural network
- human operators
- security policies
- cyber attacks
- anomaly detection
- security management
- mobile devices
- data encryption