-
1
Research on OLE object vulnerability analysis for RTF file
Published 2016-01-01Subjects: Get full text
Article -
2
-
3
Overview of control-flow hijacking attack and defense techniques for process
Published 2019-12-01Subjects: “…software security…”
Get full text
Article -
4
A Toolchain for Assisting Migration of Software Executables Towards Post-Quantum Cryptography
Published 2025-01-01Subjects: Get full text
Article -
5
Research progress in code reuse attacking and defending
Published 2018-03-01Subjects: “…software security…”
Get full text
Article -
6
Analysis model of binary code security flaws based on structure characteristics
Published 2017-09-01Subjects: Get full text
Article -
7
A model for developing dependable systems using a component‐based software development approach (MDDS‐CBSD)
Published 2023-02-01Subjects: Get full text
Article