-
1
Overview of control-flow hijacking attack and defense techniques for process
Published 2019-12-01Subjects: Get full text
Article -
2
Smart Fuzzing method based on comparison algorithm of control flow sequences
Published 2013-04-01Subjects: Get full text
Article -
3
Symbolic execution based control flow graph extraction method for Android native codes
Published 2017-07-01Subjects: “…control flow graph…”
Get full text
Article -
4
Method against process control-flow hijacking based on mimic defense
Published 2021-01-01Subjects: “…control-flow hijacking…”
Get full text
Article -
5
Design and Research of Climbing Mechanism based on Gear Rack Transmission
Published 2016-01-01Subjects: Get full text
Article -
6
Code vulnerability detection method based on graph neural network
Published 2021-06-01Subjects: Get full text
Article -
7
Constructing method of opaque predicate based on type conversion and operation of floating point numbers
Published 2023-10-01Subjects: Get full text
Article -
8
Control-flow integrity technology based on the combination of software and hardware
Published 2024-10-01Subjects: Get full text
Article -
9
PSTR: A Test Case Reuse Method Based on Path Similarity
Published 2025-01-01Subjects: Get full text
Article -
10
Survey of software anomaly detection based on deception
Published 2022-02-01Subjects: Get full text
Article -
11
Automatic exploitation generation method of write-what-where vulnerability
Published 2022-01-01Subjects: Get full text
Article