共 50 条
- [41] Simulation of a secure CPU with SecureTag technique to defend embedded systems against buffer overflow attacks 2007 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2007, : 484 - +
- [42] Protecting Private Keys against Memory Disclosure Attacks using Hardware Transactional Memory 2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 3 - 19
- [44] Experiments with deceptive software responses to buffer-overflow attacks IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 43 - 44
- [45] Embedded TaintTracker: Lightweight Run-Time Tracking of Taint Data against Buffer Overflow Attacks IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (11): : 2129 - 2138
- [46] A New Data Randomization Method to Defend Buffer Overflow Attacks INTERNATIONAL CONFERENCE ON APPLIED PHYSICS AND INDUSTRIAL ENGINEERING 2012, PT C, 2012, 24 : 1757 - 1764
- [47] A New Data Randomization Method to Defend Buffer Overflow Attacks 2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 466 - 469
- [48] A Security Design for the Detecting of Buffer Overflow Attacks in IoT Device IEEE ACCESS, 2018, 6 : 72862 - 72869
- [49] RAD: A compile-time solution to buffer overflow attacks 21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2001, : 409 - 417
- [50] An efficient pointer protection scheme to defend buffer overflow attacks APPLIED PARALLEL COMPUTING: STATE OF THE ART IN SCIENTIFIC COMPUTING, 2006, 3732 : 1025 - 1030