共 50 条
- [5] Detecting Code Reuse Attacks with a Model of Conformant Program Execution RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, 2013, 8145 : 452 - 453
- [6] HoneyGadget: A Deception Based ROP Detection Scheme SCIENCE OF CYBER SECURITY, SCISEC 2019, 2019, 11933 : 121 - 135
- [7] Code Shredding: Byte-Granular Randomization of Program Layout for Detecting Code-Reuse Attacks 28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), 2012, : 309 - 318
- [8] A Technique Preventing Code Reuse Attacks Based on RISC Processor 2018 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND NETWORK TECHNOLOGY (CCNT 2018), 2018, 291 : 96 - 102
- [9] Defending Code Reuse Attacks Based on Running Characteristics Monitoring Ruan Jian Xue Bao/Journal of Software, 2019, 30 (11): : 3518 - 3534
- [10] Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, 2015, 455 : 431 - 445