Catch You With Cache: Out-of-VM Introspection to Trace Malicious Executions | 0 | 0.34 | 2021 |
Survey Of Cpu Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, And Countermeasures | 0 | 0.34 | 2021 |
Efficient Dynamic Tracking Technique for Detecting Integer-Overflow-to-Buffer-Overflow Vulnerability | 4 | 0.40 | 2015 |
Loop-Oriented Programming: A New Code Reuse Attack to Bypass Modern Defenses | 0 | 0.34 | 2015 |
Improving The Accuracy Of Integer Signedness Error Detection Using Data Flow Analysis | 0 | 0.34 | 2015 |
Loop-Oriented Programming: A New Code Reuse Attack to Bypass Modern Defenses | 1 | 0.37 | 2015 |