A Theory of Secure Control Flow
- 1 January 2005
- book chapter
- Published by Springer Nature
- p. 111-124
- https://doi.org/10.1007/11576280_9
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- Edit automata: enforcement mechanisms for run-time security policiesInternational Journal of Information Security, 2005
- On the effectiveness of address-space randomizationPublished by Association for Computing Machinery (ACM) ,2004
- Secure program execution via dynamic information flow trackingPublished by Association for Computing Machinery (ACM) ,2004
- Beyond stack smashing: recent advances in exploiting buffer overrunsIEEE Security & Privacy, 2004
- SASI enforcement of security policies: a retrospectivePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- From system F to typed assembly languageACM Transactions on Programming Languages and Systems, 1999
- Protection in programming-language translationsPublished by Springer Nature ,1998
- Proof-carrying codePublished by Association for Computing Machinery (ACM) ,1997
- ATOMPublished by Association for Computing Machinery (ACM) ,1994
- Efficient software-based fault isolationACM SIGOPS Operating Systems Review, 1993