메뉴 건너뛰기




Volumn 2015-October, Issue , 2015, Pages 256-267

Heisenbyte: Thwarting memory disclosure attacks using destructive code reads

Author keywords

Binary rewriting; Destructive code reads; Memory disclosure

Indexed keywords

BINS; CODES (SYMBOLS); JUST IN TIME PRODUCTION; VIRTUAL REALITY;

EID: 84954181687     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2810103.2813685     Document Type: Conference Paper
Times cited : (73)

References (29)
  • 3
    • 85025171717 scopus 로고    scopus 로고
    • Oxymoron: Making fine-grained memory randomization practical by allowing code sharing
    • M. Backes and S. Nürnberger. Oxymoron: Making fine-grained memory randomization practical by allowing code sharing. Proc. 23rd Usenix Security Sym, pages 433-447, 2014.
    • (2014) Proc. 23rd Usenix Security Sym , pp. 433-447
    • Backes, M.1    Nürnberger, S.2
  • 8
    • 33745621075 scopus 로고    scopus 로고
    • Destructive-read in embedded dram, impact on power consumption
    • Apr.
    • H. Dybdahl, P. G. Kjeldsberg, M. Grannæs, and L. Natvig. Destructive-read in embedded dram, impact on power consumption. J. Embedded Comput., 2(2):249-260, Apr. 2006.
    • (2006) J. Embedded Comput. , vol.2 , Issue.2 , pp. 249-260
    • Dybdahl, H.1    Kjeldsberg, P.G.2    Grannæs, M.3    Natvig, L.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.