Cited By
View all- Becker LHollick MClassen JDoupé AMilburn A(2024)SoKProceedings of the 18th USENIX Conference on Offensive Technologies10.5555/3696933.3696947(189-209)Online publication date: 12-Aug-2024
- Jang HKim TShin YLuo BLiao XXu JKirda ELie D(2024)SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple SiliconProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690189(64-78)Online publication date: 2-Dec-2024
- Xiang HCheng ZLi JMa JLu KLuo BLiao XXu JKirda ELie D(2024)Boosting Practical Control-Flow Integrity with Complete Field Sensitivity and Origin AwarenessProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670308(4524-4538)Online publication date: 2-Dec-2024
- Show More Cited By