Abstract
Untrusted solutions embedded in an electronic device are executed securely
and without compromising the security or the performance of the device with the use of a
container technology.
Creative Commons License
This work is licensed under a Creative Commons Attribution-Share Alike 4.0 License.
Recommended Citation
INC, HP, "SECURE EXECUTION OF UNTRUSTED CODE", Technical Disclosure Commons, (March 24, 2020)
https://www.tdcommons.org/dpubs_series/3046
COinS