Cited By
View all- Olbort MSpiekermann DKeller J(2024)Manipulating the Swap Memory for Forensic InvestigationProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670887(1-6)Online publication date: 30-Jul-2024
- Lim HKim JLee HLuo BLiao XXu JKirda ELie D(2024)uMMU: Securing Data Confidentiality with Unobservable Memory SubsystemProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690340(2993-3007)Online publication date: 2-Dec-2024
- Zhang YCai QLi HLin JWang W(2024)mShield: Protecting In-process Sensitive Data Against Vulnerable Third-Party LibrariesSecurity and Privacy in Communication Networks10.1007/978-3-031-64948-6_25(496-513)Online publication date: 13-Oct-2024
- Show More Cited By