Cited By
View all- Zieris PHorsch JKim JAhn GKim SKim YLopez JKim T(2018)A Leak-Resilient Dual Stack Scheme for Backward-Edge Control-Flow IntegrityProceedings of the 2018 on Asia Conference on Computer and Communications Security10.1145/3196494.3196531(369-380)Online publication date: 29-May-2018
- Pawlak RMonperrus MPetitprez NNoguera CSeinturier L(2016)SPOONSoftware—Practice & Experience10.1002/spe.234646:9(1155-1179)Online publication date: 1-Sep-2016
- Dang TManiatis PWagner DBao FMiller SZhou JAhn G(2015)The Performance Cost of Shadow Stacks and Stack CanariesProceedings of the 10th ACM Symposium on Information, Computer and Communications Security10.1145/2714576.2714635(555-566)Online publication date: 14-Apr-2015
- Show More Cited By