Author:
Ibn Ziad Mohamed Tarek,Arroyo Miguel A.,Manzhosov Evgeny,Piersma Ryan,Sethumadhavan Simha
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Memory Tagging using Cryptographic Integrity on Commodity x86 CPUs;2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P);2024-07-08
2. TD-Zero: Automatic Golden-Free Hardware Trojan Detection Using Zero-Shot Learning;IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems;2024-07
3. RTT-UAF: Reuse Time Tracking for Use-After-Free Detection;Proceedings of the 38th ACM International Conference on Supercomputing;2024-05-30
4. Cryptographically Enforced Memory Safety;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
5. MIFP: Selective Fat-Pointer Bounds Compression for Accurate Bounds Checking;Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses;2023-10-16