Author:
D’Elia Daniele Cono,Invidia Lorenzo,Querzoni Leonardo
Publisher
Springer International Publishing
Reference45 articles.
1. Allred, C.: Understanding Windows file system transactions. In: Storage Developer Conference 2009. SNIA (2009). https://www.snia.org/sites/default/orig/sdc_archives/2009_presentations/tuesday/ChristianAllred_UnderstandingWindowsFileSystemTransactions.pdf
2. Angelini, M., et al.: ROPMate: visually assisting the creation of ROP-based exploits. In: Proceedings of the 15th IEEE Symposium on Visualization for Cyber Security. VizSec 2018 (2018). https://doi.org/10.1109/VIZSEC.2018.8709204
3. Blackthorne, J., Bulazel, A., Fasano, A., Biernat, P., Yener, B.: AVLeak: fingerprinting antivirus emulators through black-box testing. In: 10th USENIX Workshop on Offensive Technologies. WOOT 2016, USENIX Association (2016)
4. Borrello, P., Coppa, E., D’Elia, D.C.: Hiding in the particles: when return-oriented programming meets program obfuscation. In: Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 555–568. DSN 2021. IEEE (2021). https://doi.org/10.1109/DSN48987.2021.00064
5. Borrello, P., Coppa, E., D’Elia, D.C., Demetrescu, C.: The ROP needle: hiding trigger-based injection vectors via code reuse. In: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, pp. 1962–1970. SAC 2019. ACM (2019). https://doi.org/10.1145/3297280.3297472
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献