共 50 条
- [21] Protecting Instruction Set Randomization from Code Reuse Attacks SECURE IT SYSTEMS, 2018, 11252 : 421 - 436
- [22] Fast and Practical Instruction-Set Randomization for Commodity Systems 26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), 2010, : 41 - 48
- [23] Loongson Instruction Set Architecture Technology Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (01): : 2 - 16
- [25] Research on IP Traceback Technology Based on DDoS Attack MODERN TECHNOLOGIES IN MATERIALS, MECHANICS AND INTELLIGENT SYSTEMS, 2014, 1049 : 1820 - 1823
- [26] The research of Network Attack and Defense Training Based on Enterprise Scenario Teaching NATIONAL TEACHING SEMINAR ON CRYPTOGRAPHY AND INFORMATION SECURITY (2010NTS-CIS), PROCEEDINGS, 2010, : 117 - +
- [27] Research on Defense Model and Detection of Abnormal Characteristics of Network Attack Based on FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY V, 2015, : 577 - 581
- [28] Research on sybil attack in defense blockchain based on improved PBFT algorithm Tongxin Xuebao/Journal on Communications, 2020, 41 (09): : 104 - 117
- [29] Known/chosen key attacks against software instruction set randomization 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 349 - +
- [30] An Instruction-set Randomization Using Length-preserving Permutation 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 376 - 383