Article

Innovative Instructions and Software Model for Isolated Execution

This paper analyzes the threats and attacks to applications. It then describes the ISA extension for generating a HW based container.
Автор: админ Последнее обновление: 17.05.2019 - 07:48