Memory integrity protection

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

With the growth of the personal computers and the internet, computers are now integrated into our lives. With all the conveniences this phenomena also creates more vulnerabilities. An intruder who is physically located on the other side of the earth may gain access to our most secret information by breaking through our firewall and gaining access to the internals of our computing system. Compromised computers may leak our most private information: personal documents, pictures and movies, browsing history, chat history, bank account passwords, etc.

Cite

CITATION STYLE

APA

Hu, Y., & Sunar, B. (2012). Memory integrity protection. In Introduction to Hardware Security and Trust (Vol. 9781441980809, pp. 305–324). Springer New York. https://doi.org/10.1007/978-1-4419-8080-9_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free