Login / Signup
Customized Instructions for Protection Against Memory Integrity Attacks.
Debapriya Basu Roy
Manaar Alam
Sarani Bhattacharya
Vidya Govindan
Francesco Regazzoni
Rajat Subhra Chakraborty
Debdeep Mukhopadhyay
Published in:
IEEE Embed. Syst. Lett. (2018)
Keyphrases
</>
data corruption
memory requirements
watermarking scheme
countermeasures
memory size
memory usage
memory space
database integrity
integrity checking
traffic analysis
limited memory
security threats
computational power
integrity constraints
malicious users
information systems
neural network