Author:
Davi Lucas,Liebchen Christopher,Sadeghi Ahmad-Reza,Snow Kevin Z.,Monrose Fabian
Cited by
85 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Mayhem: Targeted Corruption of Register and Stack Variables;Proceedings of the 19th ACM Asia Conference on Computer and Communications Security;2024-07
2. GuiDiv: Mitigating Code-reuse Attack in an IoT Cluster Using Guided Control Flow Diversification;2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);2023-11-01
3. R2C: AOCR-Resilient Diversity with Reactive and Reflective Camouflage;Proceedings of the Eighteenth European Conference on Computer Systems;2023-05-08
4. MagBox: Keep the risk functions running safely in a magic box;Future Generation Computer Systems;2023-03
5. NG-MVEE: A New Proposed Hybrid Technique for Enhanced Mitigation of Code Re-Use Attack;IEEE Access;2023