메뉴 건너뛰기




Volumn , Issue , 2014, Pages

Hardware-assisted fine-grained control-flow integrity: Towards efficient protection of embedded systems against software exploitation

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER AIDED DESIGN; EMBEDDED SYSTEMS;

EID: 84903161773     PISSN: 0738100X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2593069.2596656     Document Type: Conference Paper
Times cited : (89)

References (20)
  • 3
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • Aleph One. Smashing the stack for fun and profit. Phrack Magazine, 49(14), 1996.
    • (1996) Phrack Magazine , vol.49 , pp. 14
    • One, A.1
  • 10
    • 84903219684 scopus 로고    scopus 로고
    • Dynamic sequence checking of programs to detect code reuse attacks
    • A. K. Kanuparthi, J. Rajendran, M. Zahran, and R. Karri. Dynamic sequence checking of programs to detect code reuse attacks. Technical report, 2013. http://isis.poly.edu/~arun/tvlsi.pdf.
    • (2013) Technical report
    • Kanuparthi, A.K.1    Rajendran, J.2    Zahran, M.3    Karri, R.4
  • 13
    • 4344593013 scopus 로고    scopus 로고
    • Beyond stack smashing: Recent advances in exploiting buffer overruns
    • July
    • J. Pincus and B. Baker. Beyond stack smashing: Recent advances in exploiting buffer overruns. IEEE Security and Privacy, 2(4), July 2004.
    • (2004) IEEE Security and Privacy , vol.2 , pp. 4
    • Pincus, J.1    Baker, B.2
  • 14
    • 84880296077 scopus 로고    scopus 로고
    • Extreme scale computing
    • J. Rattner. Extreme scale computing. ISCA Keynote, 2012.
    • (2012) ISCA Keynote
    • Rattner, J.1
  • 16
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent esh on the bone: Return-into-libc without function calls (on the x86)
    • H. Shacham. The geometry of innocent esh on the bone: Return-into-libc without function calls (on the x86). In ACM Conf. on Computer and Communications Security, CCS '07, 2007.
    • (2007) ACM Conf. On Computer and Communications Security, CCS '07
    • Shacham, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.