共 50 条
- [1] Software Countermeasures for Control Flow Integrity of Smart Card C Codes COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 200 - 218
- [2] Embedding formally proved code in a smart card: Converting B to C ICFEM 2000: THIRD INTERNATIONAL CONFERENCE ON FORMAL ENGINEERING METHODS, PROCEEDINGS, 2000, : 15 - 22
- [3] Control-Flow Bending: On the Effectiveness of Control-Flow Integrity PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, 2015, : 161 - 176
- [4] Enforcing Unique Code Target Property for Control-Flow Integrity PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1470 - 1486
- [5] Fine-Grained Control-Flow Integrity for Kernel Software 1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, 2016, : 179 - 194
- [6] Opaque Control-Flow Integrity 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
- [8] PROLEPSIS: Binary analysis and instrumentation of IoT software for control-flow integrity International Conference on Electrical, Computer, Communications and Mechatronics Engineering, ICECCME 2021, 2021,
- [9] Control-Flow Carrying Code PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 3 - 14
- [10] Out Of Control: Overcoming Control-Flow Integrity 2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 575 - 589