Cited By
View all- Maar LNasahl PMangard SQuek TGao DZhou JCardenas A(2024)Beyond the Edges of Kernel Control-Flow Hijacking Protection with HEK-CFIProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3661135(1214-1230)Online publication date: 1-Jul-2024
- Zhang NFeng ZXu D(2024)An In-Depth Analysis of the Code-Reuse Gadgets Introduced by Software ObfuscationApplied Cryptography and Network Security10.1007/978-3-031-54776-8_9(217-240)Online publication date: 29-Feb-2024
- Da Silva JBizarrias FDa Silva LPenha R(2023)Governança e Performance em Gestão de ProjetosRevista de Gestão e Secretariado (Management and Administrative Professional Review)10.7769/gesec.v14i3.185314:3(3836-3858)Online publication date: 22-Mar-2023
- Show More Cited By