Cited By
View all- Modesti PGolightly LHolmes LOpara CMoscini M(2024)Bridging the Gap: A Survey and Classification of Research-Informed Ethical Hacking ToolsJournal of Cybersecurity and Privacy10.3390/jcp40300214:3(410-448)Online publication date: 16-Jul-2024
- Richter IZhou JCriswell J(2024)DeTRAP: RISC-V Return Address Protection With Debug Triggers2024 IEEE Secure Development Conference (SecDev)10.1109/SecDev61143.2024.00021(166-177)Online publication date: 7-Oct-2024
- Cloosters TDraissi OWillbold JHolz TDavi L(2024)Memory Corruption at the Border of Trusted ExecutionIEEE Security and Privacy10.1109/MSEC.2024.338143922:4(87-96)Online publication date: 1-Jul-2024
- Show More Cited By