Author:
Buchanan Erik,Roemer Ryan,Shacham Hovav,Savage Stefan
Cited by
122 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Beyond the Edges of Kernel Control-Flow Hijacking Protection with HEK-CFI;Proceedings of the 19th ACM Asia Conference on Computer and Communications Security;2024-07
2. An In-Depth Analysis of the Code-Reuse Gadgets Introduced by Software Obfuscation;Lecture Notes in Computer Science;2024
3. DOPE: DOmain Protection Enforcement with PKS;Annual Computer Security Applications Conference;2023-12-04
4. TypeSqueezer: When Static Recovery of Function Signatures for Binary Executables Meets Dynamic Analysis;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
5. Whole-Program Control-Flow Path Attestation;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15