Author:
Huang Zhi Jun,Zheng Tao,Liu Jia
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Classification of return-oriented programming gadgets: a machine learning approach;Journal of Computer Virology and Hacking Techniques;2024-06-19
2. Safeguarding Inter-Device Communications for Connected Systems: A Holistic Security Framework;2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME);2023-07-19
3. Detecting and Preventing ROP Attacks using Machine Learning on ARM;2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC);2023-06
4. ASLR and ROP Attack Mitigations for ARM-Based Android Devices;Communications in Computer and Information Science;2017
5. Detecting Code Reuse Attacks with a Model of Conformant Program Execution;Lecture Notes in Computer Science;2014