Author:
Davi Lucas,Gens David,Liebchen Christopher,Sadeghi Ahmad-Reza
Cited by
40 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. FortifyPatch: Towards Tamper-Resistant Live Patching in Linux-Based Hypervisor;Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis;2024-09-11
2. Beyond the Edges of Kernel Control-Flow Hijacking Protection with HEK-CFI;Proceedings of the 19th ACM Asia Conference on Computer and Communications Security;2024-07
3. Understanding the Security Landscape of Control-Data and Non-Control-Data Attacks Against IoT Systems;2024 9th International Conference on Smart and Sustainable Technologies (SpliTech);2024-06-25
4. Randomize the Running Function When It Is Disclosed;IEEE Transactions on Computers;2024-06
5. Towards Unveiling Exploitation Potential With Multiple Error Behaviors for Kernel Bugs;IEEE Transactions on Dependable and Secure Computing;2024-01