Sign Up to like & get
recommendations!
1
Published in 2020 at "Journal of Computer Science and Technology"
DOI: 10.1007/s11390-020-9703-2
Abstract: In recent years many security attacks occur when malicious codes abuse in-process memory resources. Due to the increasing complexity, an application program may call third-party code which cannot be controlled by programmers but may contain…
read more here.
Keywords:
memory protection;
process memory;
memory;
security ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2022.3210866
Abstract: Batteryless devices harvest energy from sporadic ambient sources, enabling a wide range of long-lived, stand-alone, and environmentally-friendly sustainable applications. Software on these devices operates intermittently due to frequent power failures. Each power failure leads the…
read more here.
Keywords:
memory protection;
protection;
mpi memory;
intermittent computing ... See more keywords