Cited By
View all- Chen YZhang SJia XZhou QHuang HXu SDu H(2024)SEDSpec: Securing Emulated Devices by Enforcing Execution Specification2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)10.1109/DSN58291.2024.00056(522-534)Online publication date: 24-Jun-2024
- Hu ZLee SPeinado MMeng WJensen CCremers CKirda E(2023)Hacksaw: Hardware-Centric Kernel Debloating via Device Inventory and Dependency AnalysisProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623208(1994-2008)Online publication date: 15-Nov-2023
- Senuki MIshiguro KKono KHong JLanperne MPark JCerny TShahriar H(2023)Nioh-PT: Virtual I/O Filtering for Agile Protection against Vulnerability WindowsProceedings of the 38th ACM/SIGAPP Symposium on Applied Computing10.1145/3555776.3577687(1293-1300)Online publication date: 27-Mar-2023
- Show More Cited By