Learn More
micro-architecture blindly uses the address in the program counter to fetch and execute instructions without validating its legitimacy. Whenever this blindfolded instruction sequencing is not properly addressed at a higher level by system, it becomes a vulnerability of control data attacks, today's dominant and most critical security threats. To remedy it,(More)
  • 1