Author:
Hu Hong,Shinde Shweta,Adrian Sendroiu,Chua Zheng Leong,Saxena Prateek,Liang Zhenkai
Cited by
209 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Input-Driven Dynamic Program Debloating for Code-Reuse Attack Mitigation;Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering;2023-11-30
2. DSLR–: A low-overhead data structure layout randomization for defending data-oriented programming;Journal of Computer Security;2023-11-24
3. TypeSqueezer: When Static Recovery of Function Signatures for Binary Executables Meets Dynamic Analysis;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
4. Pervasive Micro Information Flow Tracking;IEEE Transactions on Dependable and Secure Computing;2023-11
5. TAICHI: Transform Your Secret Exploits Into Mine From a Victim's Perspective;IEEE Transactions on Dependable and Secure Computing;2023-11