Author:
Lyerly Robert,Wang Xiaoguang,Ravindran Binoy
Publisher
Springer International Publishing
Reference50 articles.
1. Aga, M.T., Austin, T.: Smokestack: thwarting DOP attacks with runtime stack layout randomization. In 2019 IEEE/ACM International Symposium on Code Generation and Optimization (CGO), pp. 26–36. IEEE (2019)
2. Aleph, O.: Smashing the stack for fun and profit (1996).
http://www.shmoo.com/phrack/Phrack49/p49-14
3. Backes, M., Nürnberger, S.: Oxymoron: making fine-grained memory randomization practical by allowing code sharing. In: Proceedings of the 23rd USENIX Security Symposium, pp. 433–447 (2014)
4. Bailey, D.H., et al.: The NAS parallel benchmarks summary and preliminary results. In Supercomputing 1991: Proceedings of the 1991 ACM/IEEE Conference on Supercomputing, pp. 158–165. IEEE (1991)
5. Barbalace, A., et al.: Breaking the boundaries in heterogeneous-ISA datacenters. In: ACM SIGPLAN Notices, vol. 52, pp. 645–659. ACM (2017)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Custom Page Fault Handling With eBPF;Proceedings of the SIGCOMM Workshop on eBPF and Kernel Extensions;2024-08-04
2. DynaCut;Proceedings of the 24th International Middleware Conference on ZZZ;2023-11-27
3. Machine-Learning-Based Vulnerability Detection and Classification in Internet of Things Device Security;Electronics;2023-09-18
4. Rave: A Modular and Extensible Framework for Program State Re-Randomization;Proceedings of the 9th ACM Workshop on Moving Target Defense;2022-11-07
5. SoK: A Survey on Redundant Execution Technology;2021 International Conference on Advanced Computing and Endogenous Security;2022-04-21