Pavel Vasek

Learn More
Secure computing systems require the implementation of protection domains and a safe way of transferring control across such domains. Isolating the contexts (activation stacks) of the caller and the callee, to avoid unintended information flow, is a fundamental requirement for implementing cross–domain transfers. We present and evaluate two approaches for(More)
  • 1