Publisher
Springer Nature Switzerland
Reference32 articles.
1. Bigelow, D., Hobson, T., Rudd, R., Streilein, W., Okhravi, H.: Timely rerandomization for mitigating memory disclosures. In: Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS), pp. 268–279 (2015)
2. Burow, N., Zhang, X., Payer, M.: SoK: shining light on shadow stacks. In: Proceedings of the 40th IEEE Symposium on Security and Privacy (Oakland), San Francisco, CA, pp. 985–999 (2019)
3. Wu, C., et al.: Dancing with wolves: an intra-process isolation technique with privileged hardware. IEEE Trans. Dependable Secure Comput. 20(3), 1959–1978 (2022)
4. Cho, H., et al.: Exploiting uses of uninitialized stack variables in linux kernels to leak kernel pointers. In: Proceedings of the 14th USENIX Workshop on Offensive Technologies (WOOT), p. 3 (2020)
5. Corbet, J.: x86 NX support (2004). https://lwn.net/%20Articles/87814/