共 50 条
- [32] Demand Control-Flow Analysis VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION, VMCAI 2019, 2019, 11388 : 226 - 246
- [33] Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 952 - 963
- [34] Differentially-Private Control-Flow Node Coverage for Software Usage Analysis PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 1021 - 1038
- [35] MazeRunner: Evaluating the Attack Surface of Control-Flow Integrity Policies 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 810 - 821
- [36] SafeController: Efficient and Transparent Control-Flow Integrity for RTL Design 2020 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2020), 2020, : 270 - 275
- [37] HCIC: Hardware-Assisted Control-Flow Integrity Checking IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01): : 458 - 471
- [39] Enforcing Unique Code Target Property for Control-Flow Integrity PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1470 - 1486
- [40] A Survey on Control-Flow Integrity Means in Web Application Frameworks SECURE IT SYSTEMS, NORDSEC 2013, 2013, 8208 : 231 - 246