Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Computer Networks and Communications,Information Systems,Software
Reference36 articles.
1. Abadi, M, Budiu M, Erlingsson U, Ligatti J (2005) Control-flow integrity In: Acm Conference on Computer & Communications Security.
http://xueshu.baidu.com/s?wd=paperuri%3A%28f6b7e0d5098513f897e156e75fa04af2%29&filter=sc_long_sign&sc_ks_para=q%3DControl-flow%20integrity&sc_us=1548336401933715558&tn=SE_baiduxueshu_c1gjeupa&ie=utf-8
.
2. Akritidis, P, Cadar C, Raiciu C, Costa M, Castro M (2008) Preventing memory error exploits with WIT In: 2008 IEEE Symposium on Security and Privacy (sp 2008), 263–277.. IEEE.
https://ieeexplore.ieee.org/abstract/document/4531158/
.
3. Austin, TM, Breach SE, Sohi GS (1994) Efficient detection of all pointer and array access errors (Vol. 29, No. 6, pp. 290-301). ACM.
https://dl.acm.org/citation.cfm?id=178446
.
4. Balakrishnan, G, Reps T (2005) Recovery of variables and heap structure in x86 executables. Technical Report 1533, Computer Sciences Department.
5. Bruening, D, Zhao Q (2011) Practical memory checking with dr. memory In: Proceedings of the 9th Annual IEEE/ACM International Symposium on Code Generation and Optimization, 213–223. IEEE Computer Society
https://dl.acm.org/citation.cfm?id=2190067
.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. PyGuard: Finding and Understanding Vulnerabilities in Python Virtual Machines;2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE);2021-10
2. Cyber Vulnerability Intelligence for Internet of Things Binary;IEEE Transactions on Industrial Informatics;2020-03