Author:
Sharifi Rasool,Venkat Ashish
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Memory Tagging using Cryptographic Integrity on Commodity x86 CPUs;2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P);2024-07-08
2. RTT-UAF: Reuse Time Tracking for Use-After-Free Detection;Proceedings of the 38th ACM International Conference on Supercomputing;2024-05-30
3. Pythia: Compiler-Guided Defense Against Non-Control Data Attacks;Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3;2024-04-27
4. Cryptographically Enforced Memory Safety;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
5. ProMiSE: A High-Performance Programmable Hardware Monitor for High Security Enforcement of Software Execution;IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems;2023-11