Showing results 1 to 6 of 6
Title | Author(s) | Issue Date | |
---|---|---|---|
Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop Proceeding/Conference:Proceedings - IEEE Symposium on Security and Privacy | 2017 | ||
Efficient protection of path-sensitive control security Proceeding/Conference:Proceedings of the 26th USENIX Security Symposium | 2017 | ||
Enforcing unique code target property for control-flow integrity Proceeding/Conference:Proceedings of the ACM Conference on Computer and Communications Security | 2018 | ||
Rampart: Protecting web applications from CPU-exhaustion denial-of-service attacks Proceeding/Conference:Proceedings of the 27th USENIX Security Symposium | 2018 | ||
Razor: A framework for post-deployment software debloating Proceeding/Conference:Proceedings of the 28th USENIX Security Symposium | 2019 | ||
Slimium: Debloating the Chromium Browser with Feature Subsetting Proceeding/Conference:Proceedings of the ACM Conference on Computer and Communications Security | 2020 |