CORC

浏览/检索结果: 共4条,第1-4条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Tell you a Definite Answer: Whether Your Data is Tainted During Thread Scheduling 期刊论文
IEEE Transactions on Software Engineering, 2018
作者:  Zhang, Xiaodong;  Yang, Zijiang;  Zheng, Qinghua;  Hao, Yu;  Liu, Pei
收藏  |  浏览/下载:8/0  |  提交时间:2019/11/19
Hijacking Your Routers via Control-Hijacking URLs in Embedded Devices with Web Interfaces 会议论文
INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018-01-01
作者:  Yuan, Ming;  Li, Ye;  Li, Zhoujun
收藏  |  浏览/下载:7/0  |  提交时间:2019/12/30
Deobfuscation of Virtualization-Obfuscated Code Through Symbolic Execution and Compilation Optimization 会议论文
INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018-01-01
作者:  Liang, Mingyue;  Li, Zhoujun;  Zeng, Qiang;  Fang, Zhejun
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/30
Hijacking your routers via control-hijacking URLs in embedded devices with web interfaces 期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, 卷号: 10631 LNCS, 页码: 363-373
作者:  Yuan, M.;  Li, Y.;  Li, Z.
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/30


©版权所有 ©2017 CSpace - Powered by CSpace