David Hely
Home
Publications
Research
Teaching
Contact
A red team blue team approach towards a secure processor design with hardware shadow stack
Cyril Bresch
,
Adrien Michelet
,
Laurent Amato
,
Thomas Meyer
,
David Hély
January 2017
PDF
Cite
DOI
Type
Conference paper
Publication
IEEE 2nd International Verification and Security Workshop, IVSW 2017, Thessaloniki, Greece, July 3-5, 2017
Cite
×