Binary translation for hardened software security
Abstract:
Processors in computerized systems can be targeted by hostile actors seeking to bypass security policies and may employ published or otherwise known vulnerabilities. Embodiments may include security subsystems and methods of operation that identify known vulnerabilities during execution and implement countermeasures or enforce security policies.
Public/Granted literature
Information query
Patent Agency Ranking
0/0