Toward Register Spilling Security Using LLVM and ARM Pointer Authentication.
Andrea FantiCarlos Chinea PerezRémi Denis-CourmontGianluca RoascioJan-Erik EkbergPublished in: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. (2022)
Keyphrases
- security mechanisms
- security requirements
- identity authentication
- data encryption
- user authentication
- fuzzy vault
- authentication mechanism
- integrity verification
- authentication protocol
- security analysis
- authentication systems
- biometric data
- authentication scheme
- high security
- encryption decryption
- data structure
- factor authentication
- security services
- identity management
- smart card
- elliptic curve cryptography
- security issues
- information security
- private key
- virtual private network
- security systems
- security protocols
- key agreement protocol
- identity based cryptography
- password authentication
- access control
- public key infrastructure
- intrusion detection
- biometric authentication
- key distribution
- security policies
- computer security
- electronic payment
- biometric template
- wireless local area network
- public key
- trust relationships
- secure communication
- network security
- security model
- rights management
- public key cryptography
- key management
- digital signature
- biometric recognition
- trust negotiation
- trusted third party