Author:
Gawlik Robert,Koppe Philipp,Kollenda Benjamin,Pawlowski Andre,Garmany Behrad,Holz Thorsten
Publisher
Springer International Publishing
Reference66 articles.
1. Abadi, M., Budiu, M., Erlingsson, U., Ligatti, J.: Control-flow integrity. In: ACM Conference on Computer and Communications Security (CCS) (2005)
2. Alexa. The top 500 sites on the web (2014).
http://www.alexa.com/topsites
3. Athanasakis, M., Athanasopoulos, E., Polychronakis, M., Portokalidis, G., Ioannidis, S.: The devil is in the constants: bypassing defenses in browser JIT engines. In: Symposium on Network and Distributed System Security (NDSS) (2015)
4. Backes, M., Nürnberger, S.: Oxymoron: making fine-grained memory randomization practical byallowing code sharing. In: USENIX Security Symposium (2014)
5. Barrantes, E.G., Ackley, D.H., Palmer, T.S., Stefanovic, D., Zovi, D.D.: Randomized instruction set emulation to disrupt binary code injection attacks. In: ACM Conference on Computer and Communications Security (CCS) (2003)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Back to the future: N-Versioning of Microservices;2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN);2022-06
2. Sharing is caring;Proceedings of the Seventeenth European Conference on Computer Systems;2022-03-28
3. Stopping Memory Disclosures via Diversification and Replicated Execution;IEEE Transactions on Dependable and Secure Computing;2021-01-01
4. Multi-Variant eXecution: State-of-the-Art and Research Challenges;2020 12th International Conference on Communication Software and Networks (ICCSN);2020-06
5. kMVX;Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems;2019-04-04