Cited By
View all- Khan SChatterjee BPande STsafrir DMusuvathi MGupta RAbu-Ghazaleh N(2024)Pythia: Compiler-Guided Defense Against Non-Control Data AttacksProceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 310.1145/3620666.3651343(850-866)Online publication date: 27-Apr-2024
- Ahmed SLiljestrand HJamjoom HHicks MAsokan NYao DCalandrino JTroncoso C(2023)Not all data are created equalProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620318(1433-1450)Online publication date: 9-Aug-2023
- Franzen FWilhelmer AGrossklags J(2023)RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat its AnalysisProceedings of the 39th Annual Computer Security Applications Conference10.1145/3627106.3627197(677-690)Online publication date: 4-Dec-2023
- Show More Cited By