ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Architectural Supports to Protect OS Kernels from Code-Injection Attacks
Proceedings of the Hardware and Architectural Support for Security and Privacy 2016 on - HASP 2016
◽
10.1145/2948618.2948623
◽
2016
◽
Cited By ~ 3
Author(s):
Hyungon Moon
◽
Jinyong Lee
◽
Dongil Hwang
◽
Seonhwa Jung
◽
Jiwon Seo
◽
...
Keyword(s):
Injection Attacks
◽
Code Injection
Download Full-text
Related Documents
Cited By
References
GMSA: Gathering Multiple Signatures Approach to Defend Against Code Injection Attacks
IEEE Access
◽
10.1109/access.2018.2884201
◽
2018
◽
Vol 6
◽
pp. 77829-77840
◽
Cited By ~ 2
Author(s):
Hussein Alnabulsi
◽
Rafiqul Islam
◽
Majharul Talukder
Keyword(s):
Injection Attacks
◽
Code Injection
Download Full-text
An Architectural Approach to Preventing Code Injection Attacks
IEEE Transactions on Dependable and Secure Computing
◽
10.1109/tdsc.2010.1
◽
2010
◽
Vol 7
(4)
◽
pp. 351-365
◽
Cited By ~ 14
Author(s):
Ryan Riley
◽
Xuxian Jiang
◽
Dongyan Xu
Keyword(s):
Injection Attacks
◽
Code Injection
Download Full-text
Server-Side Code Injection Attacks: A Historical Perspective
Research in Attacks, Intrusions, and Defenses - Lecture Notes in Computer Science
◽
10.1007/978-3-642-41284-4_3
◽
2013
◽
pp. 41-61
◽
Cited By ~ 3
Author(s):
Jakob Fritz
◽
Corrado Leita
◽
Michalis Polychronakis
Keyword(s):
Historical Perspective
◽
Server Side
◽
Injection Attacks
◽
Code Injection
Download Full-text
RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization
2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007)
◽
10.1109/srds.2007.4365697
◽
2007
◽
Cited By ~ 2
Author(s):
Xuxian Jiang
◽
Helen J. Wangz
◽
Dongyan Xu
◽
Yi-Min Wang
Keyword(s):
Injection Attacks
◽
System Service
◽
Code Injection
◽
Service Interface
Download Full-text
Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps
Detection of Intrusions and Malware, and Vulnerability Assessment - Lecture Notes in Computer Science
◽
10.1007/978-3-319-60876-1_10
◽
2017
◽
pp. 209-229
◽
Cited By ~ 4
Author(s):
Thomas Barabosch
◽
Niklas Bergmann
◽
Adrian Dombeck
◽
Elmar Padilla
Keyword(s):
Injection Attacks
◽
Code Injection
Download Full-text
Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution
IEICE Transactions on Communications
◽
10.1587/transcom.e95.b.1711
◽
2012
◽
Vol E95.B
(5)
◽
pp. 1711-1721
◽
Cited By ~ 1
Author(s):
YoungHan CHOI
◽
HyoungChun KIM
◽
DongHoon LEE
Keyword(s):
Web Pages
◽
Injection Attacks
◽
Code Injection
Download Full-text
Runtime Defense against Code Injection Attacks Using Replicated Execution
IEEE Transactions on Dependable and Secure Computing
◽
10.1109/tdsc.2011.18
◽
2011
◽
Vol 8
(4)
◽
pp. 588-601
◽
Cited By ~ 28
Author(s):
B Salamat
◽
T Jackson
◽
G Wagner
◽
C Wimmer
◽
M Franz
Keyword(s):
Injection Attacks
◽
Code Injection
Download Full-text
Hardware-based instruction set randomization against code injection attacks
2017 3rd IEEE International Conference on Computer and Communications (ICCC)
◽
10.1109/compcomm.2017.8322778
◽
2017
◽
Author(s):
San Du
◽
Hui Shu
◽
Fei Kang
◽
Xiaobing Xiong
◽
Zheng Wang
Keyword(s):
Instruction Set
◽
Injection Attacks
◽
Code Injection
◽
Based Instruction
Download Full-text
An Architectural Approach to Preventing Code Injection Attacks
37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07)
◽
10.1109/dsn.2007.13
◽
2007
◽
Cited By ~ 8
Author(s):
Ryan Riley
◽
Xuxian Jiang
◽
Dongyan Xu
Keyword(s):
Injection Attacks
◽
Code Injection
Download Full-text
DroidCIA: A Novel Detection Method of Code Injection Attacks on HTML5-Based Mobile Apps
2015 IEEE Trustcom/BigDataSE/ISPA
◽
10.1109/trustcom.2015.477
◽
2015
◽
Cited By ~ 10
Author(s):
Yen-Lin Chen
◽
Hahn-Ming Lee
◽
Albert B. Jeng
◽
Te-En Wei
Keyword(s):
Detection Method
◽
Mobile Apps
◽
Injection Attacks
◽
Code Injection
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close