Article

Innovative Instructions and Software Model for Isolated Execution

This paper analyzes the threats and attacks to applications. It then describes the ISA extension for generating a HW based container.
Autor admin Última actualización 08/10/2019 - 18:20