Cited By
View all- Gupta AHabibi JKirkpatrick MBertino E(2015)Marlin: Mitigating Code Reuse Attacks Using Code RandomizationIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2014.234538412:3(326-337)Online publication date: 1-May-2015
- Bertino EHartman N(2015)Cybersecurity for product lifecycle management a research roadmap2015 IEEE International Conference on Intelligence and Security Informatics (ISI)10.1109/ISI.2015.7165949(114-119)Online publication date: May-2015
- Yuan PZeng QDing X(2015)Hardware-Assisted Fine-Grained Code-Reuse Attack DetectionProceedings of the 18th International Symposium on Research in Attacks, Intrusions, and Defenses - Volume 940410.1007/978-3-319-26362-5_4(66-85)Online publication date: 2-Nov-2015
- Show More Cited By