Enlisting hardware architecture to thwart malicious code injection

Ruby B. Lee, David K. Karig, John P. McGregor, Zhijie Shi

Research output: Contribution to journalArticlepeer-review

35 Scopus citations

Fingerprint

Dive into the research topics of 'Enlisting hardware architecture to thwart malicious code injection'. Together they form a unique fingerprint.

Keyphrases

Computer Science