共 50 条
- [2] Enforcing Unique Code Target Property for Control-Flow Integrity PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1470 - 1486
- [3] TitanCFI: Toward Enforcing Control-Flow Integrity in the Root-of-Trust 2024 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2024,
- [4] Control-Flow Bending: On the Effectiveness of Control-Flow Integrity PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, 2015, : 161 - 176
- [5] Security Analysis of Processor Instruction Set Architecture for Enforcing Control-Flow Integrity PROCEEDINGS OF THE 8TH INTERNATIONAL WORKSHOP ON HARDWARE AND ARCHITECTURAL SUPPORT FOR SECURITY AND PRIVACY, HASP '19, 2019,
- [6] Opaque Control-Flow Integrity 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
- [8] TFCFI:Transparent Forward Fine-grained Control-Flow Integrity Protection 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 407 - 414
- [9] Out Of Control: Overcoming Control-Flow Integrity 2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 575 - 589
- [10] Survey on Control-flow Integrity Techniques Ruan Jian Xue Bao/Journal of Software, 2023, 34 (01): : 489 - 508