共 22 条
[1]
Abadi M, 1998, LECT NOTES COMPUT SC, V1443, P868, DOI 10.1007/BFb0055109
[2]
On Protection by Layout Randomization
[J].
2010 23RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF),
2010,
:337-351
[4]
Agten P., 2012, 619 CW KU LEUV
[5]
[Anonymous], 2009, PROC 2 EUROPEAN WORK
[6]
[Anonymous], 2012, P NETW DISTR SYST SE
[7]
Azab AM, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P375
[8]
Erlingsson U, 2010, HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, P633, DOI 10.1007/978-3-642-04117-4_30
[9]
Local Memory via Layout Randomization
[J].
2011 IEEE 24TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF),
2011,
:161-174
[10]
Jeffrey A, 2005, LECT NOTES COMPUT SC, V3444, P423