Securing Binary Code
暂无分享,去创建一个
Jack W. Davidson | Jason Hiser | Anh Nguyen-Tuong | Michele Co | William H. Hawkins | J. Davidson | A. Nguyen-Tuong | Jason Hiser | M. Co
[1] Jack W. Davidson,et al. Dynamic Canary Randomization for Improved Software Security , 2016, CISRC.
[2] Mihai Budiu,et al. Control-flow integrity principles, implementations, and applications , 2009, TSEC.
[3] Richard Ford,et al. Heartbleed 101 , 2014, IEEE Security & Privacy.
[4] Jack W. Davidson,et al. ILR: Where'd My Gadgets Go? , 2012, 2012 IEEE Symposium on Security and Privacy.
[5] Mike Walker. Machine vs. Machine: Lessons from the First Year of Cyber Grand Challenge , 2015 .
[6] Barton P. Miller,et al. Binary code is not easy , 2016, ISSTA.
[7] Thomas G. Szymanski,et al. Chaining Span-Dependent Jump Instructions , 1980, ACM Trans. Program. Lang. Syst..
[8] Jason Hiser,et al. Diversity in Cybersecurity , 2016, Computer.
[9] Dan Boneh,et al. Hacking Blind , 2014, 2014 IEEE Symposium on Security and Privacy.