With the growth of the personal computers and the internet, computers are now integrated into our lives. With all the conveniences this phenomena also creates more vulnerabilities. An intruder who is physically located on the other side of the earth may gain access to our most secret information by breaking through our firewall and gaining access to the internals of our computing system. Compromised computers may leak our most private information: personal documents, pictures and movies, browsing history, chat history, bank account passwords, etc.
CITATION STYLE
Hu, Y., & Sunar, B. (2012). Memory integrity protection. In Introduction to Hardware Security and Trust (Vol. 9781441980809, pp. 305–324). Springer New York. https://doi.org/10.1007/978-1-4419-8080-9_13
Mendeley helps you to discover research relevant for your work.