Exploiting memory leaks, injecting code into processes, and a variety of side-channel attacks could become much more difficult to pull off if a technique for creating a “morphable” processor architecture gains widespread adoption.
Read full article on Dark Reading