共 82 条
[1]
Abadi M., 2005, Proceedings of the 12th ACM Conference on Computer and Communications Security, P340
[3]
Challenges in Designing Exploit Mitigations for Deeply Embedded Systems
[J].
2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P),
2019,
:31-46
[4]
Abbasi A, 2016, P1
[5]
C-FLAT: Control-Flow Attestation for Embedded Systems Software
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:743-754
[6]
Preventing memory error exploits with WIT
[J].
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2008,
:263-+
[7]
μRAI: Securing Embedded Systems with Return Address Integrity
[J].
27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020),
2020,
[8]
ARM Ltd, 2024, Discovery Kit with STM32L562QE MCU
[9]
ARM Ltd, 2023, ARM Cortex-M Programming Guide to Memory Barrier Instructions
[10]
ARM Ltd, 2021, Armv8-M Architecture Reference Manual