Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Journal Article
%1 journals/jetc/Biernacki0XA0WT21
%A Biernacki, Lauren
%A Gallagher, Mark
%A Xu, Zhixing
%A Aga, Misiker Tadesse
%A Harris, Austin
%A Wei, Shijia
%A Tiwari, Mohit
%A Kasikci, Baris
%A Malik, Sharad
%A Austin, Todd M.
%D 2021
%J ACM J. Emerg. Technol. Comput. Syst.
%K dblp
%N 3
%P 42:1-42:38
%T Software-driven Security Attacks: From Vulnerability Sources to Durable Hardware Defenses.
%U http://dblp.uni-trier.de/db/journals/jetc/jetc17.html#Biernacki0XA0WT21
%V 17
@article{journals/jetc/Biernacki0XA0WT21,
added-at = {2023-09-30T00:00:00.000+0200},
author = {Biernacki, Lauren and Gallagher, Mark and Xu, Zhixing and Aga, Misiker Tadesse and Harris, Austin and Wei, Shijia and Tiwari, Mohit and Kasikci, Baris and Malik, Sharad and Austin, Todd M.},
biburl = {https://www.bibsonomy.org/bibtex/29e16cc5eedb71d40bd1a84e689f0f533/dblp},
ee = {https://www.wikidata.org/entity/Q113434124},
interhash = {5a8abaf580c0832f6d91a49925782d98},
intrahash = {9e16cc5eedb71d40bd1a84e689f0f533},
journal = {ACM J. Emerg. Technol. Comput. Syst.},
keywords = {dblp},
number = 3,
pages = {42:1-42:38},
timestamp = {2024-04-08T21:29:36.000+0200},
title = {Software-driven Security Attacks: From Vulnerability Sources to Durable Hardware Defenses.},
url = {http://dblp.uni-trier.de/db/journals/jetc/jetc17.html#Biernacki0XA0WT21},
volume = 17,
year = 2021
}