MemCloak: Practical Access Obfuscation for Untrusted Memory.
Weixin LiangKai BuKe LiJinhong LiArya TavakoliPublished in: ACSAC (2018)
Keyphrases
- random access
- third party
- access control
- computing power
- memory requirements
- secondary storage
- practical application
- security policies
- memory usage
- read write
- mobile devices
- privacy preserving
- information systems
- main memory
- real time
- reverse engineering
- genetic algorithm
- data mining
- storage devices
- remote access
- real world