共 49 条
[22]
Reconfigurable Dynamic Trusted Platform Module for Control Flow Checking
[J].
2014 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI),
2014,
:167-172
[23]
Davis L.J., 2014, DISABILITY STUDIES R, V4th, P1, DOI DOI 10.29118/IPA.0.14.G.025
[24]
Demme J., 2013, ACM SIGARCH computer architecture news, V41, P559, DOI 10.1145/2485922
[25]
Dinaburg A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P51
[27]
Runtime execution monitoring (REM) to detect and prevent malicious code execution
[J].
IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN: VLSI IN COMPUTERS & PROCESSORS, PROCEEDINGS,
2004,
:452-457
[28]
Gascon H, 2013, P 2013 ACM WORKSH AR, P45, DOI 10.1145/2517312.2517315
[29]
Hall M., 2009, SIGKDD EXPLORATIONS, V11, P10, DOI [DOI 10.1145/1656274.1656278, 10.1145/1656274.1656278]
[30]
A Survey of Microarchitecture Support for Embedded Processor Security
[J].
2012 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI),
2012,
:368-373