Author:
Song Chengyu,Moon Hyungon,Alam Monjur,Yun Insu,Lee Byoungyoung,Kim Taesoo,Lee Wenke,Paek Yunheung
Cited by
37 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Memory Tagging using Cryptographic Integrity on Commodity x86 CPUs;2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P);2024-07-08
2. Bitmap-Based Security Monitoring for Deeply Embedded Systems;ACM Transactions on Software Engineering and Methodology;2024-06-18
3. Pythia: Compiler-Guided Defense Against Non-Control Data Attacks;Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3;2024-04-27
4. A Hardware-Based Correct Execution Environment Supporting Virtual Memory;IEEE Access;2024
5. Optimized Data-Flow Integrity for Modern Compilers;IEEE Access;2024