Author:
Wang Qingran,Guo Wei,Sun Dazhi,Wei Jizeng
Reference11 articles.
1. Khudia, D.S., Mahlke, S.: Low cost control flow protection using abstract control signatures. ACM Sigplan Not. 5(48), 3–12 (2016)
2. Aktas, E., Afram, F., Ghose, K.: Continuous, low overhead, run-time validation of program executions. In: IEEE/ACM International Symposium on Microarchitecture, pp. 229–241. IEEE Computer Society (2014)
3. Trusted Platform Module spec, http://www.trustedcomputinggroup.org/
4. Fiskiran, A.M., Lee, R.B.: Runtime execution monitoring (REM) to detect and prevent malicious code execution, pp. 452–457. IEEE Computer Society (2004)
5. Arora, D., et al.: Hardware-assisted run-time monitoring for secure program execution on embedded processors. IEEE Trans. Very Large Scale Integr. Syst. 14, 1295–1308 (2006). IEEE