Showing results 1 to 6 of 6
Title | Author(s) | Issue Date | Views | |
---|---|---|---|---|
Efficient protection of path-sensitive control security Proceeding/Conference:Proceedings of the 26th USENIX Security Symposium | 2017 | 9 | ||
Enforcing unique code target property for control-flow integrity Proceeding/Conference:Proceedings of the ACM Conference on Computer and Communications Security | 2018 | 10 | ||
Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels Proceeding/Conference:Proceedings - IEEE Symposium on Security and Privacy | 2018 | 5 | ||
Razor: A framework for post-deployment software debloating Proceeding/Conference:Proceedings of the 28th USENIX Security Symposium | 2019 | 11 | ||
Slimium: Debloating the Chromium Browser with Feature Subsetting Proceeding/Conference:Proceedings of the ACM Conference on Computer and Communications Security | 2020 | 18 | ||
Toward engineering a secure android ecosystem: A survey of existing techniques Journal:ACM Computing Surveys | 2016 | 4 |