Author:
Chen Baiyu,Fu Da,Yang Yuanyuan
Publisher
Springer International Publishing
Reference68 articles.
1. Zhou Y, Wang X, Chen Y, Wang Z (2014) Armlock: hardware-based fault isolation for arm. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, November 3. ACM, pp 558–569
2. Chen Y, Wang Z, Whalley D, Lu L (2016) Remix: on-demand live randomization. In: Proceedings of the sixth ACM conference on data and application security and privacy, 9 March. ACM, pp 50–61
3. Chen Y, Khandaker M, Wang Z (2017) Pinpointing vulnerabilities. In: Proceedings of the 2017 ACM on Asia conference on computer and communications security, 2 April. ACM, pp 334–345
4. Wang X, Chen Y, Wang Z, Qi Y, Zhou Y (2015) SecPod: a framework for virtualization-based security systems. In: USENIX annual technical conference, 8 July, pp 347–360
5. Chen Y, Zhang Y, Wang Z, Wei T (2017) Downgrade attack on TrustZone, 17 July. arXiv preprint arXiv:1707.05082
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献