共 50 条
- [21] Timely address space rerandomization for resisting code reuse attacks CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (16):
- [23] Preventing Kernel Code-Reuse Attacks Through Disclosure Resistant Code Diversification 2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 189 - 197
- [24] Accurately detecting source code of attacks that increase privilege Lect. Notes Comput. Sci., (104-116):
- [25] Mitigating Code-Reuse Attacks with Control-Flow Locking 27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), 2011, : 353 - 362
- [26] MAVR: Code Reuse Stealthy Attacks and Mitigation on Unmanned Aerial Vehicles 2015 IEEE 35TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, 2015, : 642 - 652
- [27] Finding dispatcher gadgets for jump oriented programming code reuse attacks 2013 IEEE 8TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI 2013), 2013, : 321 - 325
- [28] μShield Configurable Code-Reuse Attacks Mitigation For Embedded Systems NETWORK AND SYSTEM SECURITY, 2017, 10394 : 694 - 709
- [29] Defending AUTOSAR Safety Critical Systems Against Code Reuse Attacks PROCEEDINGS OF THE ACM WORKSHOP ON AUTOMOTIVE CYBERSECURITY (AUTOSEC '19), 2019, : 15 - 18
- [30] Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, 2015, 455 : 431 - 445