Author:
Koo Hyungjoon,Chen Yaohui,Lu Long,Kemerlis Vasileios P.,Polychronakis Michalis
Cited by
52 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Scalable, Sound, and Accurate Jump Table Analysis;Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis;2024-09-11
2. Randomize the Running Function When It Is Disclosed;IEEE Transactions on Computers;2024-06
3. Plankton: Reconciling Binary Code and Debug Information;Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2;2024-04-27
4. Proactive defense mechanism: Enhancing IoT security through diversity-based moving target defense and cyber deception;Computers & Security;2024-04
5. A novel approach to optimizing transaction processing rate and space requirement of blockchain via off-chain architecture;International Journal of Information Technology;2024-01-06