Author:
Tian Donghai,Jia Xiaoqi,Zhan Li,Hu Changzhen,Xue Jingfeng
Publisher
Springer International Publishing
Reference26 articles.
1. Yao, X., Han, X., Du, X., Zhou, X.: A lightweight multicast authentication mechanism for small scale IoT applications. IEEE Sens. J. 13, 3693–3701 (2013)
2. Metasploit (2014).
http://www.metasploit.com/
3. Shacham, H.: The geometry of innocent flesh on the bone. In: ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, pp. 552–561, October 2007
4. Luk, C.K., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Reddi, V.J., Hazelwood, K.: Pin: building customized program analysis tools with dynamic instrumentation. In: Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), vol. 40(6), pp. 190–200 (2005)
5. Intel corp. intel 64 and ia-32 architectures software developer’s manuals (2014).
http://www.intel.com/Assets/PDF/manual/253669.pdf
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. An online approach to defeating ROP attacks
∗;Concurrency and Computation: Practice and Experience;2018-09-05