Cited By
View all- Zhao LJiang KZhu YWang LMing J(2023)Capturing Invalid Input Manipulations for Memory Corruption DiagnosisIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.314502220:2(917-930)Online publication date: 1-Mar-2023
- Xu ZGupta AMalik S(2017)Trace-based Analysis of Memory Corruption Malware AttacksHardware and Software: Verification and Testing10.1007/978-3-319-70389-3_5(67-82)Online publication date: 12-Nov-2017
- Evtyushkin DPonomarev DAbu-Ghazaleh NHsu WYang CLipasti MLee H(2016)Jump over ASLRThe 49th Annual IEEE/ACM International Symposium on Microarchitecture10.5555/3195638.3195686(1-13)Online publication date: 15-Oct-2016
- Show More Cited By