共 50 条
- [1] A Method for Analyzing Code-Reuse Attacks Programming and Computer Software, 2019, 45 : 473 - 484
- [4] Capturing Malware Propagations with Code Injections and Code-Reuse Attacks CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1691 - 1708
- [5] μShield Configurable Code-Reuse Attacks Mitigation For Embedded Systems NETWORK AND SYSTEM SECURITY, 2017, 10394 : 694 - 709
- [6] Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, 2015, 455 : 431 - 445
- [7] Preventing Kernel Code-Reuse Attacks Through Disclosure Resistant Code Diversification 2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 189 - 197
- [8] Mitigating Code-Reuse Attacks with Control-Flow Locking 27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), 2011, : 353 - 362
- [9] Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains COMPUTER SECURITY - ESORICS 2021, PT I, 2021, 12972 : 218 - 239