Tasić et al., 2015
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Niu et al. | Per-input control-flow integrity | |
| Crane et al. | It's a TRaP: Table randomization and protection against function-reuse attacks | |
| Dalton et al. | Raksha: a flexible information flow architecture for software security | |
| Ward et al. | Survey of cyber moving targets second edition | |
| US10255414B2 (en) | Software self-defense systems and methods | |
| Lee et al. | Enlisting hardware architecture to thwart malicious code injection | |
| Volckaert et al. | Cloning your gadgets: Complete ROP attack immunity with multi-variant execution | |
| Riley et al. | An architectural approach to preventing code injection attacks | |
| Park et al. | Nojitsu: Locking down javascript engines | |
| Gens et al. | Lazarus: Practical side-channel resilient kernel-space randomization | |
| Shi et al. | InfoShield: A security architecture for protecting information usage in memory | |
| Jenkins et al. | Ghostbusting: Mitigating Spectre with intraprocess memory isolation | |
| Enomoto et al. | Efficient Protection Mechanism for CPU Cache Flush Instruction Based Attacks | |
| Piromsopa et al. | Survey of protections from buffer-overflow attacks | |
| Voulimeneas et al. | DMON: A distributed heterogeneous n-variant system | |
| Coppens et al. | Multi-variant execution environments | |
| US11361070B1 (en) | Protecting devices from remote code execution attacks | |
| Tasić et al. | Detecting Attacks using Program Alternatives | |
| Belleville et al. | KALD: Detecting direct pointer disclosure vulnerabilities | |
| Ozdoganoglu et al. | Smashguard: A hardware solution to prevent attacks on the function return address | |
| Karwayun et al. | War of Control Hijacking: Attacks and Defenses | |
| Sinha | Repurposing Software Defenses with Specialized Hardware | |
| Minato et al. | Implementation and Evaluation of a System Call Moving Target Defense Applied Multiple Times at Runtime for Binary Injections | |
| Zou | Software-Based Techniques for Protecting Return Addresses | |
| Rösti | Survivable Heterogeneous Multi-Variant Execution |