共 50 条
- [1] TRUVIN: Lightweight Detection of Data-Oriented Attacks Through Trusted Value Integrity [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 174 - 181
- [2] Exploitation Techniques and Defenses for Data-Oriented Attacks [J]. 2019 IEEE SECURE DEVELOPMENT (SECDEV 2019), 2019, : 114 - 128
- [3] Data-Oriented Programming: On the Expressiveness of Non-Control Data Attacks [J]. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 969 - 986
- [4] Secure IoT Data Analytics in Cloud via Intel SGX [J]. 2020 IEEE 13TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2020), 2020, : 43 - 52
- [5] Proofs of Ownership on Encrypted Cloud Data via Intel SGX [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2020, 2020, 12418 : 400 - 416
- [6] HardScope: Hardening Embedded Systems Against Data-Oriented Attacks [J]. PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,
- [7] Towards a Formal Foundation of Protection against Data-Oriented Attacks [J]. PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 2016, : 413 - 417
- [8] Data Integrity Attacks and Defenses for Intel Lab Sensor Network [J]. 2015 IEEE 2ND WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2015, : 721 - 726
- [10] Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks [J]. PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 1433 - 1450