共 50 条
- [1] SoK: On the Effectiveness of Control-Flow Integrity in Practice PROCEEDINGS OF THE 18TH USENIX WOOT CONFERENCE ON OFFENSIVE TECHNOLOGIES, WOOT 2024, 2024, : 189 - 209
- [2] Opaque Control-Flow Integrity 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
- [4] Out Of Control: Overcoming Control-Flow Integrity 2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 575 - 589
- [5] Survey on Control-flow Integrity Techniques Ruan Jian Xue Bao/Journal of Software, 2023, 34 (01): : 489 - 508
- [7] Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 952 - 963
- [8] POSTER: Control-Flow Integrity for Smartphones PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 749 - 751
- [9] On the Effectiveness of Control-Flow Integrity Against Modern Attack Techniques ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2019, 2019, 562 : 331 - 344