Reference 1
Reference 1 Persistent Data-only Malware: Function Hooks without Code. NDSS, 2014. ↩
If you could revise
the fundmental principles of
computer system design
to improve security...
... what would you change?