共 50 条
- [21] Capturing Malware Propagations with Code Injections and Code-Reuse Attacks CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1691 - 1708
- [22] SCRAP: Architecture for Signature-Based Protection from Code Reuse Attacks 19TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE COMPUTER ARCHITECTURE (HPCA2013), 2013, : 258 - 269
- [23] Bee Master: Detecting Host-Based Code Injection Attacks DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2014, 2014, 8550 : 235 - 254
- [26] US Airways' Wolf attacks 'deception' of code-sharing AVIATION WEEK & SPACE TECHNOLOGY, 1998, 148 (21): : 56 - 57
- [27] Deception-Based Game Theoretical Approach to Mitigate DoS Attacks DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016), 2016, 9996 : 18 - 38
- [28] Detecting probability footprints of sensor deception attacks in supervisory control IFAC PAPERSONLINE, 2024, 58 (01): : 192 - 197
- [29] A metadata-driven approach to efficiently detect code-reuse attacks on ARM multiprocessors JOURNAL OF SUPERCOMPUTING, 2021, 77 (07): : 7287 - 7314
- [30] A metadata-driven approach to efficiently detect code-reuse attacks on ARM multiprocessors The Journal of Supercomputing, 2021, 77 : 7287 - 7314