- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
The detector reveals stealthy peripheral-based attacks on the host's main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only measures intermittently.



