End-to-End Automated Exploit Generation for Validating the Security of Processor Designs.
Rui ZhangCalvin DeutschbeinPeng HuangCynthia SturtonPublished in: MICRO (2018)
Keyphrases
- end to end
- ad hoc networks
- wireless ad hoc networks
- information security
- multipath
- admission control
- high bandwidth
- access control
- congestion control
- key management
- network security
- transport layer
- application layer
- service delivery
- intrusion detection
- high speed
- security policies
- content delivery
- service management
- real time