Funder
Science and Technology Key Project of Tianjin
Publisher
Public Library of Science (PLoS)
Reference19 articles.
1. Aktas E, Afram F, Ghose K. Continuous, low overhead, run-time validation of program executions. In: Proceedings of the 47th Annual IEEE/ACM International Symposium on Microarchitecture. IEEE Computer Society; 2014. p. 229–241.
2. ACM SIGPLAN Notices;DS Khudia,2013
3. Fiskiran AM, Lee RB. Runtime execution monitoring (REM) to detect and prevent malicious code execution. In: Computer Design: VLSI in Computers and Processors, 2004. ICCD 2004. Proceedings. IEEE International Conference on. IEEE; 2004. p. 452–457.
4. Hardware-assisted run-time monitoring for secure program execution on embedded processors;D Arora;IEEE Transactions on Very Large Scale Integration (VLSI) Systems,2006
5. Control-flow checking by software signatures;N Oh;IEEE transactions on Reliability,2002