Login / Signup
Performance evolution of mitigating transient execution attacks.
Jonathan Behrens
Adam Belay
M. Frans Kaashoek
Published in:
EuroSys (2022)
Keyphrases
</>
countermeasures
steady state
watermarking algorithm
execution model
data mining
case study
data flow
active databases
software evolution
temporal evolution
java card
malicious attacks