Funder
National Key Research and Development Program of China
Huawei Technologies
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Computer Networks and Communications,Information Systems,Software
Reference43 articles.
1. Abadi, M, Budiu M, Erlingsson U, Ligatti J (2005) Control-flow integrity In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS ’05, 340–353.
https://doi.org/10.1145/1102120.1102165
.
2. Akritidis, P, Cadar C, Raiciu C, Costa M, Castro M (2008) Preventing memory error exploits with wit In: 2008 IEEE Symposium on Security and Privacy, S&P’08, 263–277.
https://doi.org/10.1109/SP.2008.30
.
3. Amazon (2018) Amazon elastic compute cloud.
http://aws.amazon.com/ec2/
.
4. ARM (2016) ARM Embedded Trace Macrocell Architecture Specification ETMv4.0 to ETMv4.2. ARM Limited.
https://static.docs.arm.com/ihi0064/d/IHI0064D_etm_v4_ar٪chitecture_spec.pdf
. Accessed 23 Sep 2018.
5. Azab, AM, Ning P, Shah J, Chen Q, Bhutkar R, Ganesh G, Ma J, Shen W (2014) Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS ’14, 90–102.. ACM, New York, NY, USA.
https://doi.org/10.1145/2660267/2660350
.
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献