咨询与建议

限定检索结果

文献类型

  • 2 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 2 篇 计算机科学与技术...
    • 1 篇 信息与通信工程

主题

  • 3 篇 return-oriented ...
  • 1 篇 fuzzing for soft...
  • 1 篇 rop gadgets
  • 1 篇 libraries
  • 1 篇 deep learning
  • 1 篇 code-reuse attac...
  • 1 篇 programming
  • 1 篇 software enginee...
  • 1 篇 message authenti...
  • 1 篇 malware classifi...
  • 1 篇 control flow dia...
  • 1 篇 system-event-bas...
  • 1 篇 reverse-engineer...
  • 1 篇 intellectual pro...
  • 1 篇 control-flow int...
  • 1 篇 reverse engineer...
  • 1 篇 software obfusca...
  • 1 篇 security-oriente...
  • 1 篇 security
  • 1 篇 key management

机构

  • 1 篇 chinese acad sci...
  • 1 篇 chinese acad sci...
  • 1 篇 clemson univ ele...
  • 1 篇 n carolina state...
  • 1 篇 hubei univ arts ...
  • 1 篇 wuhan university...
  • 1 篇 chinese acad sci...
  • 1 篇 chinese acad sci...
  • 1 篇 the pennsylvania...
  • 1 篇 pusan national u...

作者

  • 1 篇 mckee sally a.
  • 1 篇 hou rui
  • 1 篇 peng liu
  • 1 篇 junwei zhou
  • 1 篇 haizhou wang
  • 1 篇 zhang lixin
  • 1 篇 meng dan
  • 1 篇 song wei
  • 1 篇 chen mingyu
  • 1 篇 zhilong wang
  • 1 篇 zitong shang
  • 1 篇 zhang jun
  • 1 篇 lan zhang
  • 1 篇 jia zhen
  • 1 篇 dhanasekaran ara...
  • 1 篇 yoon-ho choi
  • 1 篇 joshi harshvardh...
  • 1 篇 qingtian zou
  • 1 篇 dutta rudra
  • 1 篇 zheng chen

语言

  • 3 篇 英文
检索条件"主题词=return-oriented programming attacks"
3 条 记 录,以下是1-10 订阅
排序:
Impact of Software Obfuscation on Susceptibility to return-oriented programming attacks  36
Impact of Software Obfuscation on Susceptibility to Return-O...
收藏 引用
36th IEEE Sarnoff Symposium
作者: Joshi, Harshvardhan P. Dhanasekaran, Aravindhan Dutta, Rudra N Carolina State Univ Dept Comp Sci Raleigh NC 27695 USA
Software obfuscation is a commonly used technique to protect software, especially against reverse-engineering attacks. It is a form of security through obscurity and is commonly used for intellectual property and Digi... 详细信息
来源: 评论
RAGuard: An Efficient and User-Transparent Hardware Mechanism against ROP attacks
收藏 引用
ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION 2019年 第4期15卷 1-21页
作者: Zhang, Jun Hou, Rui Song, Wei Mckee, Sally A. Jia, Zhen Zheng, Chen Chen, Mingyu Zhang, Lixin Meng, Dan Chinese Acad Sci ICT State Key Lab Comp Architecture Beijing Peoples R China Hubei Univ Arts & Sci Xiangyang 441053 Peoples R China Chinese Acad Sci Inst Informat Engn State Key Lab Informat Secur Beijing Peoples R China Clemson Univ Elect & Comp Engn Clemson SC 29630 USA Chinese Acad Sci Inst Comp Technol Beijing 100190 Peoples R China Chinese Acad Sci Inst Informat Engn Beijing 100190 Peoples R China
Control-flow integrity (CFI) is a general method for preventing code-reuse attacks, which utilize benign code sequences to achieve arbitrary code execution. CFI ensures that the execution of a program follows the edge... 详细信息
来源: 评论
Using deep learning to solve computer security challenges:a survey
收藏 引用
Cybersecurity 2018年 第1期1卷 815-846页
作者: Yoon-Ho Choi Peng Liu Zitong Shang Haizhou Wang Zhilong Wang Lan Zhang Junwei Zhou Qingtian Zou The Pennsylvania State University PennsylvaniaUSA Pusan National University BusanRepublic of Korea Wuhan University of Technology WuhanChina
Although using machine learning techniques to solve computer security challenges is not a new idea,the rapidly emerging Deep Learning technology has recently triggered a substantial amount of interests in the computer... 详细信息
来源: 评论