"Locking down insecure indirection with hardware-based control-data isolation."

William Arthur et al. (2015)

Details and statistics

DOI: 10.1145/2830772.2830801

access: closed

type: Conference or Workshop Paper

metadata version: 2024-05-07