共 25 条
- [2] Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86 [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1441 - 1454
- [3] Equational Reasoning on x86 Assembly Code [J]. 11TH IEEE INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION (SCAM 2011), 2011, : 75 - 84
- [4] Automated and portable native code isolation [J]. 12TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, 2001, : 298 - 307
- [5] x86 Instruction Reordering for Code Compression [J]. ACTA CYBERNETICA, 2013, 21 (01): : 177 - 190
- [6] ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, 2015, 455 : 386 - 400
- [7] Differentiating Code from Data in x86 Binaries [J]. MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES, PT III, 2011, 6913 : 522 - 536
- [8] Foreign code detection on the Windows/X86 platform [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 279 - +
- [10] Modelling the Performance of the Gaussian Chemistry Code on x86 Architectures [J]. MODELING, SIMULATION AND OPTIMIZATION OF COMPLEX PROCESSES, 2008, : 49 - +