共 50 条
- [31] Physical Unclonable Functions-based Linear Encryption against Code Reuse Attacks 2016 ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2016,
- [32] A Bispectrum-based Approach for Detecting Deception using EEG Signals 2018 IEEE 20TH INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATIONS AND SERVICES (HEALTHCOM), 2018,
- [33] Hurdle: Securing Jump Instructions Against Code Reuse Attacks TWENTY-FIFTH INTERNATIONAL CONFERENCE ON ARCHITECTURAL SUPPORT FOR PROGRAMMING LANGUAGES AND OPERATING SYSTEMS (ASPLOS XXV), 2020, : 653 - 666
- [34] Code Reuse Attacks in PHP: Automated POP Chain Generation CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 42 - 53
- [35] Protecting Instruction Set Randomization from Code Reuse Attacks SECURE IT SYSTEMS, 2018, 11252 : 421 - 436
- [36] SGXPecial: Specializing SGX Interfaces against Code Reuse Attacks PROCEEDINGS OF THE 14TH EUROPEAN WORKSHOP ON SYSTEMS SECURITY (EUROSEC 2021), 2021, : 48 - 54
- [37] ROPMEMU: A Framework for the Analysis of Complex Code-Reuse Attacks ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 47 - 58
- [38] Timely address space rerandomization for resisting code reuse attacks CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (16):
- [40] Detecting Deception in Cyber Conflict: A Strategic Approach PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 78 - 85