共 25 条
- [1] Beyond the Edges of Kernel Control-Flow Hijacking Protection with HEK-CFI PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 866 - 882
- [2] SLAKE: Facilitating Slab Manipulation for Exploiting Vulnerabilities in the Linux Kernel PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 1707 - 1722
- [3] Control-Flow Hijacking: Are We Making Progress? PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 4 - 4
- [4] AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities 2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 2122 - 2137
- [5] SMP: A New Mechanism to Mitigate Control-Flow Hijacking Attacks 2018 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS ENGINEERING (ICISE), 2018, : 51 - 55
- [6] Method against process control-flow hijacking based on mimic defense Tongxin Xuebao/Journal on Communications, 2021, 42 (01): : 37 - 47
- [7] A Synergistic Security Method for Control-Flow Hijacking Detection using SPNs 2013 FOURTH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA 2013), 2013, : 270 - 274
- [8] JITScope: Protecting Web Users from Control-Flow Hijacking Attacks 2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,
- [9] Automated Detection of Persistent Kernel Control-Flow Attacks CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 103 - 115
- [10] Fine-Grained Control-Flow Integrity for Kernel Software 1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, 2016, : 179 - 194