저자 | Thurston H.Y. Dang et al. |
연도 | 2017 |
게재처 | USENIX Security |
유형 | one-time allocate |
URL | https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/dang |
Introduction
추후 추가 예정
Background
Threat Model
Design
Implementation
Evaluation
Limitation