Login / Signup
MES-Attacks: Software-Controlled Covert Channels based on Mutual Exclusion and Synchronization.
Chaoqun Shen
Jiliang Zhang
Gang Qu
Published in:
CoRR (2022)
Keyphrases
</>
mutual exclusion
long distance
software development
temporal planning
machine learning
information flow
security risks
user interface
ddos attacks
search algorithm
source code
computer systems
security protocols
java card