Search Results - "code-reuse attack"
-
1
Software diversity evaluating method based on gadget feature analysis
Published in 网络与信息安全学报 (2023-06-01)Subjects: “…code reuse attack…”
Get full text
Article -
2
Software diversification method based on binary rewriting
Published in 网络与信息安全学报 (2023-04-01)Subjects: “…code-reuse attack…”
Get full text
Article -
3
Software diversification method based on binary rewriting
Published in 网络与信息安全学报 (2023-04-01)Subjects: “…code-reuse attack…”
Get full text
Article -
4
Software diversity evaluating method based on gadget feature analysis
Published in 网络与信息安全学报 (2023-06-01)Subjects: “…code reuse attack…”
Get full text
Article -
5
Control-flow integrity technology based on the combination of software and hardware
Published in 网络与信息安全学报 (2024-10-01)Subjects: “…code-reuse attack…”
Get full text
Article -
6
Securing Embedded System from Code Reuse Attacks: A Lightweight Scheme with Hardware Assistance
Published in Micromachines (2023-07-01)Subjects: “…code reuse attack…”
Get full text
Article -
7
Timing and Speculative Execution Attacks: Defeating State-of-the-Art Code-Reuse Defenses
Published in IEEE Access (2025-01-01)Subjects: “…Code-reuse attack…”
Get full text
Article -
8
Survey of software anomaly detection based on deception
Published in 网络与信息安全学报 (2022-02-01)Subjects: “…code reuse attack…”
Get full text
Article -
9
Survey of software anomaly detection based on deception
Published in 网络与信息安全学报 (2022-02-01)Subjects: “…code reuse attack…”
Get full text
Article -
10
A Technique of gadget Semantic Analysis Based on Expression Tree
Published in Jisuanji gongcheng (2021-01-01)Subjects: “…code reuse attack(cra)|automated gadget sequence generation|semantic analysis|semantic summary|gadget tool…”
Get full text
Article -
11
Defense Method Against Code Reuse Attack Based on Real-time Code Loading and Unloading
Published in Jisuanji kexue (2022-10-01)Subjects: “…code reuse attack|real-time code loading and unloading|return oriented programming|dynamic link library|randomized unloading…”
Get full text
Article -
12
Lightweight and Seamless Memory Randomization for Mission-Critical Services in a Cloud Platform
Published in Energies (2020-03-01)Subjects: “…code-reuse attack…”
Get full text
Article -
13
Hardware-Based Software Control Flow Integrity: Review on the State-of-the-Art Implementation Technology
Published in IEEE Access (2023-01-01)Subjects: “…Code reuse attacks…”
Get full text
Article -
14
Efficient and Robust Detection of Code-Reuse Attacks Through Probabilistic Packet Inspection in Industrial IoT Devices
Published in IEEE Access (2018-01-01)Subjects: “…Code-reuse attacks…”
Get full text
Article -
15
Binary Code-Oriented Fine-Grained Software Diversification Method
Published in Jisuanji gongcheng (2024-01-01)Subjects: “…software diversification|code-reuse attacks|binary rewriting|code randomization|data dependency…”
Get full text
Article -
16
Predictable Paths: Novel ASLR Bypass Methods and Mitigations
Published in IEEE Access (2025-01-01)Subjects: “…code-reuse attacks…”
Get full text
Article
