Speculative Software Modification and its Use in Securing SOUP
Rodes, Benjamin D., Knight, John C.
Published in 2014 Tenth European Dependable Computing Conference (01.05.2014)
Published in 2014 Tenth European Dependable Computing Conference (01.05.2014)
Get full text
Conference Proceeding
Stack layout transformation: Towards diversity for securing binary programs
Rodes, B.
Published in 2012 34th International Conference on Software Engineering (ICSE) (01.06.2012)
Published in 2012 34th International Conference on Software Engineering (ICSE) (01.06.2012)
Get full text
Conference Proceeding
A System for the Security Protection of Embedded Binary Programs
Davidson, Jack W., Hiser, Jason D., Anh Nguyen-Tuong, Coleman, Clark L., Hawkins, William H., Knight, John C., Rodes, Benjamin D., Hocking, Ashlie B.
Published in 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W) (01.06.2016)
Published in 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W) (01.06.2016)
Get full text
Conference Proceeding
A Framework for Creating Binary Rewriting Tools (Short Paper)
Hiser, Jason D., Anh Nguyen-Tuong, Co, Michele, Rodes, Benjamin, Hall, Matthew, Coleman, Clark L., Knight, John C., Davidson, Jack W.
Published in 2014 Tenth European Dependable Computing Conference (01.05.2014)
Published in 2014 Tenth European Dependable Computing Conference (01.05.2014)
Get full text
Conference Proceeding