시스템 보안
시스템·네트워크
시큐어 컴퓨팅
인공지능·정보서비스
designing Trusted Computing Environment
securing host system based on the TCE
Code-Reuse-Attack(CRA) defenses
Heap memory defenses
Memory address translation integrity
HW-based trusted execution environment
System integrity monitors