Cited By
View all- Jarkas OKo RDong NMahmud R(2025)A Container Security Survey: Exploits, Attacks, and DefensesACM Computing Surveys10.1145/371500157:7(1-36)Online publication date: 20-Feb-2025
- Wiebing STron ABos HGiuffrida CBalzarotti DXu W(2024)InSpectre gadgetProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3698933(577-594)Online publication date: 14-Aug-2024
- Chang ZLin JSun HLi RWang YHu BZhao XJiang DSun NWang S(2024)Chaos: Function Granularity Runtime Address Layout Space Randomization for Kernel ModuleProceedings of the 15th ACM SIGOPS Asia-Pacific Workshop on Systems10.1145/3678015.3680476(23-30)Online publication date: 4-Sep-2024
- Show More Cited By