共 50 条
- [2] Control-Flow Bending: On the Effectiveness of Control-Flow Integrity PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, 2015, : 161 - 176
- [3] MazeRunner: Evaluating the Attack Surface of Control-Flow Integrity Policies 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 810 - 821
- [4] Fine-Grained Control-Flow Integrity for Kernel Software 1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, 2016, : 179 - 194
- [5] On the Effectiveness of Control-Flow Integrity Against Modern Attack Techniques ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2019, 2019, 562 : 331 - 344
- [6] Opaque Control-Flow Integrity 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
- [8] PROLEPSIS: Binary analysis and instrumentation of IoT software for control-flow integrity International Conference on Electrical, Computer, Communications and Mechatronics Engineering, ICECCME 2021, 2021,
- [9] Out Of Control: Overcoming Control-Flow Integrity 2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 575 - 589
- [10] Survey on Control-flow Integrity Techniques Ruan Jian Xue Bao/Journal of Software, 2023, 34 (01): : 489 - 508