-
1
Overview of control-flow hijacking attack and defense techniques for process
Published 2019-12-01Subjects: Get full text
Article -
2
Control-flow integrity technology based on the combination of software and hardware
Published 2024-10-01Subjects: Get full text
Article -
3
Survey of software anomaly detection based on deception
Published 2022-02-01Subjects: Get full text
Article