Cited By
View all- Kim JPark JLee YSong CKim TLee BLuo BLiao XXu JKirda ELie D(2024)PeTAL: Ensuring Access Control Integrity against Data-only Attacks on LinuxProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690184(2919-2933)Online publication date: 2-Dec-2024
- Momeu MSchnückel SAngnis KPolychronakis MKemerlis VLuo BLiao XXu JKirda ELie D(2024)Safeslab: Mitigating Use-After-Free Vulnerabilities via Memory Protection KeysProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670279(1345-1359)Online publication date: 2-Dec-2024
- Momeu MKilger FRoemheld CSchnückel SProskurin SPolychronakis MKemerlis VQuek TGao DZhou JCardenas A(2024)ISLAB: Immutable Memory Management Metadata for Commodity Operating System KernelsProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3644994(1159-1172)Online publication date: 1-Jul-2024
- Show More Cited By