default search action
The Continuing Arms Race, 2018
- Per Larsen, Ahmad-Reza Sadeghi:
The Continuing Arms Race: Code-Reuse Attacks and Defenses. ACM / Morgan & Claypool 2018, ISBN 978-1-97000-183-9 - Mathias Payer:
How memory safety violations enable exploitation of programs. 1-23 - Gang Tan, Ben Niu:
Protecting dynamic code. 25-60 - Stephen Crane, Andrei Homescu, Per Larsen, Hamed Okhravi, Michael Franz:
Diversity and information leaks. 61-79 - Volodymyr Kuznetsov, Laszlo Szekeres, Mathias Payer, George Candea, R. Sekar, Dawn Song:
Code-pointer integrity. 81-116 - Enes Göktas, Elias Athanasopoulos, Herbert Bos, Georgios Portokalidis:
Evaluating control-flow restricting defenses. 117-137 - Felix Schuster, Thorsten Holz:
Attacking dynamic code. 139-180 - Yier Jin, Dean Sullivan, Orlando Arias, Ahmad-Reza Sadeghi, Lucas Davi:
Hardware control flow integrity. 181-210 - Bart Coppens, Bjorn De Sutter, Stijn Volckaert:
Multi-variant execution environments. 211-258
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.