共 50 条
- [21] Evaluating the process control-flow complexity measure 2005 IEEE International Conference on Web Services, Vols 1 and 2, Proceedings, 2005, : 803 - 804
- [22] HCFI: Hardware-enforced Control-Flow Integrity CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, : 38 - 49
- [23] Renewable Just-In-Time Control-Flow Integrity PROCEEDINGS OF THE 26TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2023, 2023, : 580 - 594
- [24] Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 952 - 963
- [25] SafeController: Efficient and Transparent Control-Flow Integrity for RTL Design 2020 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2020), 2020, : 270 - 275
- [26] HCIC: Hardware-Assisted Control-Flow Integrity Checking IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01): : 458 - 471
- [27] Enforcing Unique Code Target Property for Control-Flow Integrity PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1470 - 1486
- [28] A Survey on Control-Flow Integrity Means in Web Application Frameworks SECURE IT SYSTEMS, NORDSEC 2013, 2013, 8208 : 231 - 246
- [29] Ghostrail: Ad Hoc Control-Flow Integrity for Web Applications ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 264 - 277
- [30] Language Abstractions for Hardware-based Control-Flow Integrity Monitoring 2018 INTERNATIONAL CONFERENCE ON RECONFIGURABLE COMPUTING AND FPGAS (RECONFIG), 2018,