共 36 条
[1]
[Anonymous], 2013, ACM SIGSAC S INFORM
[2]
Bhatkar S, 2003, USENIX ASSOCIATION PROCEEDINGS OF THE 12TH USENIX SECURITY SYMPOSIUM, P105
[3]
Bhatkar Sandeep., 2005, Proceedings of the 14th Conference on USENIX Security Symposium - Volume 14, SSYM'05, V14, P17
[4]
Bletsch T., 2010, TR20108 N CAR STAT U
[5]
Mitigating Code-Reuse Attacks with Control-Flow Locking
[J].
27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011),
2011,
:353-362
[6]
Buchanan E, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P27
[7]
Checkoway S., 2011, USENIX SEC S, V4, P447
[8]
Chen P, 2010, LECT NOTES COMPUT SC, V6503, P140, DOI 10.1007/978-3-642-17714-9_11
[9]
Chen P, 2010, LECT NOTES COMPUT SC, V6476, P340, DOI 10.1007/978-3-642-17650-0_24
[10]
Chen P, 2009, LECT NOTES COMPUT SC, V5905, P163, DOI 10.1007/978-3-642-10772-6_13