Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Bringing the web up to speed with WebAssembly
The maturation of the Web platform has given rise to sophisticated and demanding Web
applications such as interactive 3D visualization, audio and video software, and games. With …
applications such as interactive 3D visualization, audio and video software, and games. With …
Security analysis methods on ethereum smart contract vulnerabilities: a survey
Smart contracts are software programs featuring both traditional applications and distributed
data storage on blockchains. Ethereum is a prominent blockchain platform with the support …
data storage on blockchains. Ethereum is a prominent blockchain platform with the support …
Sok: Eternal war in memory
Memory corruption bugs in software written in low-level languages like C or C++ are one of
the oldest problems in computer security. The lack of safety in these languages allows …
the oldest problems in computer security. The lack of safety in these languages allows …
Code-pointer integrity
In this chapter, we describe code-pointer integrity (CPI), a new design point that guarantees
the integrity of all code pointers in a program (eg, function pointers, saved return addresses) …
the integrity of all code pointers in a program (eg, function pointers, saved return addresses) …
Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C++ applications
Code reuse attacks such as return-oriented programming (ROP) have become prevalent
techniques to exploit memory corruption vulnerabilities in software programs. A variety of …
techniques to exploit memory corruption vulnerabilities in software programs. A variety of …
Control flow and code integrity for COTS binaries: An effective defense against real-world ROP attacks
Despite decades of sustained effort, memory corruption attacks continue to be one of the
most serious security threats faced today. They are highly sought after by attackers, as they …
most serious security threats faced today. They are highly sought after by attackers, as they …
Practical timing side channel attacks against kernel space ASLR
Due to the prevalence of control-flow hijacking attacks, a wide variety of defense methods to
protect both user space and kernel space code have been developed in the past years. A …
protect both user space and kernel space code have been developed in the past years. A …
SoK: Sanitizing for security
The C and C++ programming languages are notoriously insecure yet remain indispensable.
Developers therefore resort to a multi-pronged approach to find security issues before …
Developers therefore resort to a multi-pronged approach to find security issues before …
Runtime countermeasures for code injection attacks against C and C++ programs
The lack of memory safety in C/C++ often leads to vulnerabilities. Code injection attacks
exploit these vulnerabilities to gain control over the execution flow of applications. These …
exploit these vulnerabilities to gain control over the execution flow of applications. These …
Intel mpx explained: A cross-layer analysis of the intel mpx system stack
Memory-safety violations are the primary cause of security and reliability issues in software
systems written in unsafe languages. Given the limited adoption of decades-long research in …
systems written in unsafe languages. Given the limited adoption of decades-long research in …