Author:
McCoyd Michael,Krug Robert Bellarmine,Goel Deepak,Dahlin Mike,Young William
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Verification Methodology for the Arm® Confidential Computing Architecture: From a Secure Specification to Safe Implementations;Proceedings of the ACM on Programming Languages;2023-04-06
2. Understanding In-App Ads and Detecting Hidden Attacks through the Mobile App-Web Interface;IEEE Transactions on Mobile Computing;2018-11-01
3. Principles of Secure Processor Architecture Design;Synthesis Lectures on Computer Architecture;2018-10-18
4. Ditio;Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems;2017-11-06
5. Viola;Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services;2016-06-20