Cited By
View all- Chakraborty AMishra NMukhopadhyay DBalzarotti DXu W(2024)SheshaProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3698934(595-612)Online publication date: 14-Aug-2024
- Christou NGaidis AAtlidakis VKemerlis VLuo BLiao XXu JKirda ELie D(2024)Eclipse: Preventing Speculative Memory-error Abuse with Artificial Data DependenciesProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690201(3913-3927)Online publication date: 2-Dec-2024
- Jang HKim TShin YLuo BLiao XXu JKirda ELie D(2024)SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple SiliconProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690189(64-78)Online publication date: 2-Dec-2024
- Show More Cited By