Cadar et al., 2008
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Cadar et al. | Data randomization | |
| Liljestrand et al. | {PAC} it up: Towards pointer integrity using {ARM} pointer authentication | |
| Kuznetzov et al. | Code-pointer integrity | |
| Farkhani et al. | {PTAuth}: temporal memory safety via robust points-to authentication | |
| Peng et al. | {X-Force}:{Force-Executing} binary programs for security applications | |
| US10255414B2 (en) | Software self-defense systems and methods | |
| Moser et al. | Limits of static analysis for malware detection | |
| Volckaert et al. | Cloning your gadgets: Complete ROP attack immunity with multi-variant execution | |
| Larsen et al. | SoK: Automated software diversity | |
| Akritidis et al. | Preventing memory error exploits with WIT | |
| EP1870829B1 (en) | Securing software by enforcing data flow integrity | |
| Lin et al. | AutoPaG: towards automated software patch generation with source code root cause identification and repair | |
| JP2004038966A (en) | Secure and opaque type library for providing secure variable data protection | |
| Lin et al. | Polymorphing software by randomizing data structure layout | |
| Das et al. | Shakti-ms: a risc-v processor for memory safety in c | |
| Zhou et al. | OPEC: Operation-based security isolation for bare-metal embedded systems | |
| De Keulenaer et al. | Link-time smart card code hardening | |
| Yang et al. | ARM pointer authentication based forward-edge and backward-edge control flow integrity for kernels | |
| Gutstein | Memory safety with CHERI capabilities: security analysis, language interpreters, and heap temporal safety | |
| Padmanabhuni et al. | Defending against buffer-overflow vulnerabilities | |
| Ismail et al. | Enforcing C/C++ Type and Scope at Runtime for Control-Flow and Data-Flow Integrity | |
| Dharsee et al. | A software solution for hardware vulnerabilities | |
| Yan et al. | Fast PokeEMU: Scaling generated instruction tests using aggregation and state chaining | |
| Pätschke et al. | Zebrafix: Mitigating Memory-Centric Side-Channel Leakage via Interleaving | |
| Lu | Securing software systems by preventing information leaks. |