Cited By
View all- Chen ZQiu HDing X(2024)DScope: To Reliably and Securely Acquire Live Data from Kernel-Compromised ARM DevicesComputer Security – ESORICS 202310.1007/978-3-031-51482-1_14(271-289)Online publication date: 11-Jan-2024
- Cinque MDe Simone LMazzocca NOttaviano DVitale F(2023)Evaluating virtualization for fog monitoring of real-time applications in mixed-criticality systemsReal-Time Systems10.1007/s11241-023-09410-459:4(534-567)Online publication date: 1-Nov-2023
- Guo YWang ZZhong BZeng Q(2022)Formal Modeling and Security Analysis for Intra-level Privilege SeparationProceedings of the 38th Annual Computer Security Applications Conference10.1145/3564625.3567984(88-101)Online publication date: 5-Dec-2022
- Show More Cited By