Login / Signup
No Forking Way: Detecting Cloning Attacks on Intel SGX Applications.
Samira Briongos
Ghassan Karame
Claudio Soriente
Annika Wilde
Published in:
ACSAC (2023)
Keyphrases
</>
network intrusion detection systems
detecting malicious
countermeasures
automatic detection
traffic analysis
malicious attacks
database
detect malicious
intrusion detection
computer architecture
security threats
data publishing
malicious users
malicious activities