-
1
Predictable Paths: Novel ASLR Bypass Methods and Mitigations
Published 2025-01-01Subjects: Get full text
Article -
2
Software diversification method based on binary rewriting
Published 2023-04-01Subjects: Get full text
Article -
3
Control-flow integrity technology based on the combination of software and hardware
Published 2024-10-01Subjects: Get full text
Article -
4
Timing and Speculative Execution Attacks: Defeating State-of-the-Art Code-Reuse Defenses
Published 2025-01-01Subjects: “…Code-reuse attack…”
Get full text
Article