Customized Instructions for Protection Against Memory Integrity Attacks. Roy, D. B., Alam, M., Bhattacharya, S., Govindan, V., Regazzoni, F., Chakraborty, R. S., & Mukhopadhyay, D. IEEE Embed. Syst. Lett., 10(3):91–94, 2018. Paper doi bibtex @article{DBLP:journals/esl/RoyABGRCM18,
author = {Debapriya Basu Roy and
Manaar Alam and
Sarani Bhattacharya and
Vidya Govindan and
Francesco Regazzoni and
Rajat Subhra Chakraborty and
Debdeep Mukhopadhyay},
title = {Customized Instructions for Protection Against Memory Integrity Attacks},
journal = {{IEEE} Embed. Syst. Lett.},
volume = {10},
number = {3},
pages = {91--94},
year = {2018},
url = {https://doi.org/10.1109/LES.2018.2828506},
doi = {10.1109/LES.2018.2828506},
timestamp = {Thu, 10 Sep 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/esl/RoyABGRCM18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"XCysZp8a8z3ptGhQy","bibbaseid":"roy-alam-bhattacharya-govindan-regazzoni-chakraborty-mukhopadhyay-customizedinstructionsforprotectionagainstmemoryintegrityattacks-2018","author_short":["Roy, D. B.","Alam, M.","Bhattacharya, S.","Govindan, V.","Regazzoni, F.","Chakraborty, R. S.","Mukhopadhyay, D."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Debapriya","Basu"],"propositions":[],"lastnames":["Roy"],"suffixes":[]},{"firstnames":["Manaar"],"propositions":[],"lastnames":["Alam"],"suffixes":[]},{"firstnames":["Sarani"],"propositions":[],"lastnames":["Bhattacharya"],"suffixes":[]},{"firstnames":["Vidya"],"propositions":[],"lastnames":["Govindan"],"suffixes":[]},{"firstnames":["Francesco"],"propositions":[],"lastnames":["Regazzoni"],"suffixes":[]},{"firstnames":["Rajat","Subhra"],"propositions":[],"lastnames":["Chakraborty"],"suffixes":[]},{"firstnames":["Debdeep"],"propositions":[],"lastnames":["Mukhopadhyay"],"suffixes":[]}],"title":"Customized Instructions for Protection Against Memory Integrity Attacks","journal":"IEEE Embed. Syst. Lett.","volume":"10","number":"3","pages":"91–94","year":"2018","url":"https://doi.org/10.1109/LES.2018.2828506","doi":"10.1109/LES.2018.2828506","timestamp":"Thu, 10 Sep 2020 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/esl/RoyABGRCM18.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/esl/RoyABGRCM18,\n author = {Debapriya Basu Roy and\n Manaar Alam and\n Sarani Bhattacharya and\n Vidya Govindan and\n Francesco Regazzoni and\n Rajat Subhra Chakraborty and\n Debdeep Mukhopadhyay},\n title = {Customized Instructions for Protection Against Memory Integrity Attacks},\n journal = {{IEEE} Embed. Syst. Lett.},\n volume = {10},\n number = {3},\n pages = {91--94},\n year = {2018},\n url = {https://doi.org/10.1109/LES.2018.2828506},\n doi = {10.1109/LES.2018.2828506},\n timestamp = {Thu, 10 Sep 2020 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/esl/RoyABGRCM18.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Roy, D. B.","Alam, M.","Bhattacharya, S.","Govindan, V.","Regazzoni, F.","Chakraborty, R. S.","Mukhopadhyay, D."],"key":"DBLP:journals/esl/RoyABGRCM18","id":"DBLP:journals/esl/RoyABGRCM18","bibbaseid":"roy-alam-bhattacharya-govindan-regazzoni-chakraborty-mukhopadhyay-customizedinstructionsforprotectionagainstmemoryintegrityattacks-2018","role":"author","urls":{"Paper":"https://doi.org/10.1109/LES.2018.2828506"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://bibbase.org/f/QK7udauu9oYiG86Rs/bib.bib","dataSources":["H8x2obrhjRLyjakpF","ZuojF5jycEf8Xjgko","8gxn7AaKRh7GxNQNx","9LEB4ahCAz8Pkq58E","ZsvDCPRnhBRRCnWQ5"],"keywords":[],"search_terms":["customized","instructions","protection","against","memory","integrity","attacks","roy","alam","bhattacharya","govindan","regazzoni","chakraborty","mukhopadhyay"],"title":"Customized Instructions for Protection Against Memory Integrity Attacks","year":2018}