Cited By
View all- Sha ZShepherd CRafi AMarkantonakis K(2025)Control-flow attestation: Concepts, solutions, and open challengesComputers & Security10.1016/j.cose.2024.104254150(104254)Online publication date: Mar-2025
- Christou GVasiliadis GZarras AIoannidis S(2025)iVault: Architectural Code Concealing Techniques to Protect Cryptographic KeysEmbedded Computer Systems: Architectures, Modeling, and Simulation10.1007/978-3-031-78380-7_13(152-164)Online publication date: 28-Jan-2025
- Keromytis A(2025)Buffer Overflow AttacksEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_502(309-312)Online publication date: 8-Jan-2025
- Show More Cited By