An analysis of call-site patching without strong hardware support for self-modifying-code
暂无分享,去创建一个
[1] Mikel Luján,et al. Heterogeneous Managed Runtime Systems: A Computer Vision Case Study , 2017, VEE.
[2] Beng Chin Ooi,et al. A Performance Study of Big Data on Small Nodes , 2015, Proc. VLDB Endow..
[3] Alex Ramírez,et al. The low-power architecture approach towards exascale computing , 2011, ScalA '11.
[4] Per Larsen,et al. Librando: transparent code randomization for just-in-time compilers , 2013, CCS.
[5] Michael Haupt,et al. Maxine: An approachable virtual machine for, and in, java , 2013, TACO.
[6] Koen De Bosschere,et al. A Model for Self-Modifying Code , 2006, Information Hiding.
[7] Yong Meng Teo,et al. On understanding the energy consumption of ARM-based multicore servers , 2013, SIGMETRICS '13.
[8] David Naccache,et al. Can Code Polymorphism Limit Information Leakage? , 2011, WISTP.
[9] Yunsup Lee,et al. The RISC-V Instruction Set Manual , 2014 .
[10] Lorenzo Cavallaro,et al. SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed) , 2019, AsiaCCS.
[11] François-Xavier Standaert,et al. Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note , 2012, ASIACRYPT.
[12] Magnus O. Myreen. Verified just-in-time compiler on x86 , 2010, POPL '10.
[13] Sotiris Ioannidis,et al. Rage against the virtual machine: hindering dynamic analysis of Android malware , 2014, EuroSec '14.
[14] Bart Preneel,et al. A taxonomy of self-modifying code for obfuscation , 2011, Comput. Secur..
[15] No License,et al. Intel ® 64 and IA-32 Architectures Software Developer ’ s Manual Volume 3 A : System Programming Guide , Part 1 , 2006 .
[16] Amer Diwan,et al. The DaCapo benchmarks: java benchmarking development and analysis , 2006, OOPSLA '06.