Hacker News new | past | comments | ask | show | jobs | submit login

   Identifying Sensitive Program Portions.Control and data flow 
   linearization need to be applied only to regions affected 
   by secret data, as protecting non-leaky code only hampers 
Idk, interesting, if you can easily and reliably do this... You'd expect it to deliver better results than say a turnkey/do-it-all solution at the architectural level, no?

Applications are open for YC Winter 2022

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact