共 50 条
- [21] Renewable Just-In-Time Control-Flow Integrity PROCEEDINGS OF THE 26TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2023, 2023, : 580 - 594
- [23] FIPAC: Thwarting Fault- and Software-Induced Control-Flow Attacks with ARM Pointer Authentication CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2022, 2022, 13211 : 100 - 124
- [24] Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 952 - 963
- [25] MazeRunner: Evaluating the Attack Surface of Control-Flow Integrity Policies 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 810 - 821
- [26] Fine-Grained Control-Flow Integrity for Kernel Software 1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, 2016, : 179 - 194
- [27] HCIC: Hardware-Assisted Control-Flow Integrity Checking IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01): : 458 - 471
- [28] Enforcing Unique Code Target Property for Control-Flow Integrity PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1470 - 1486
- [29] A Survey on Control-Flow Integrity Means in Web Application Frameworks SECURE IT SYSTEMS, NORDSEC 2013, 2013, 8208 : 231 - 246
- [30] Ghostrail: Ad Hoc Control-Flow Integrity for Web Applications ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 264 - 277