Enlisting Hardware Architecture to Thwart Malicious Code Injection
2004 ◽
pp. 237-252
◽
2012 ◽
Vol 52
(2)
◽
pp. 19-26
◽
Keyword(s):
2016 ◽
Vol 12
(2)
◽
pp. 188-197
2011 ◽
Vol E94-A
(1)
◽
pp. 200-210