Setjmp.h

Results: 32



#Item
1Control-Flow Bending: On the Effectiveness of Control-Flow Integrity Nicolas Carlini UC Berkeley  Antonio Barresi

Control-Flow Bending: On the Effectiveness of Control-Flow Integrity Nicolas Carlini UC Berkeley Antonio Barresi

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
2Micro Python: Shrinking Python down to run on a microcontroller Damien P. George DAMTP & The Cavendish, University of Cambridge

Micro Python: Shrinking Python down to run on a microcontroller Damien P. George DAMTP & The Cavendish, University of Cambridge

Add to Reading List

Source URL: micropython.org

Language: English - Date: 2014-10-01 12:25:33
3Scrash: A System for Generating Secure Crash Information Pete Broadwell Matt Harren Naveen Sastry∗ University of California, Berkeley {pbwell, matth, nks}@cs.berkeley.edu  Abstract

Scrash: A System for Generating Secure Crash Information Pete Broadwell Matt Harren Naveen Sastry∗ University of California, Berkeley {pbwell, matth, nks}@cs.berkeley.edu Abstract

Add to Reading List

Source URL: naveen.ksastry.com

Language: English - Date: 2013-06-08 15:25:54
4WG 14 Document: N1559 Submitter: Martin Sebor Submission Date: Source: Reference Document: Version:

WG 14 Document: N1559 Submitter: Martin Sebor Submission Date: Source: Reference Document: Version:

Add to Reading List

Source URL: www.open-std.org

Language: English - Date: 2011-03-14 05:49:37
5

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:40
6Compiler optimizations based on call-graph flattening

Compiler optimizations based on call-graph flattening

Add to Reading List

Source URL: cafxx.strayorange.com

Language: English - Date: 2011-08-22 07:52:53
7V  viewpoints DOI:

V viewpoints DOI:

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2015-04-17 18:22:37
8Codejail: Application-transparent Isolation of Libraries with Tight Program Interactions? Yongzheng Wu1 , Sai Sathyanarayan2 , Roland H.C. Yap2 , and Zhenkai Liang2 1  2

Codejail: Application-transparent Isolation of Libraries with Tight Program Interactions? Yongzheng Wu1 , Sai Sathyanarayan2 , Roland H.C. Yap2 , and Zhenkai Liang2 1 2

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2013-04-19 02:17:48
9Design of a secure system  Software Security Holes and Defenses  u Follows a ring design.

Design of a secure system Software Security Holes and Defenses u Follows a ring design.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-03-14 14:43:28
10Discovering Faults in Idiom-Based Exception Handling Magiel Bruntink Arie van Deursen  Tom Tourwe´

Discovering Faults in Idiom-Based Exception Handling Magiel Bruntink Arie van Deursen Tom Tourwe´

Add to Reading List

Source URL: www.st.ewi.tudelft.nl

Language: English - Date: 2009-11-26 15:59:20