共 50 条
- [31] Advanced control-flow and concurrency in C∀ SOFTWARE-PRACTICE & EXPERIENCE, 2021, 51 (05): : 1005 - 1042
- [33] Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 952 - 963
- [34] MazeRunner: Evaluating the Attack Surface of Control-Flow Integrity Policies 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 810 - 821
- [35] SafeController: Efficient and Transparent Control-Flow Integrity for RTL Design 2020 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2020), 2020, : 270 - 275
- [36] HCIC: Hardware-Assisted Control-Flow Integrity Checking IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01): : 458 - 471
- [37] A Survey on Control-Flow Integrity Means in Web Application Frameworks SECURE IT SYSTEMS, NORDSEC 2013, 2013, 8208 : 231 - 246
- [38] Ghostrail: Ad Hoc Control-Flow Integrity for Web Applications ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 264 - 277
- [39] On the Effectiveness of Control-Flow Integrity Against Modern Attack Techniques ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2019, 2019, 562 : 331 - 344
- [40] Mitigating Code-Reuse Attacks with Control-Flow Locking 27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), 2011, : 353 - 362