Skip to search formSkip to main contentSkip to account menu

Binary hardening

Binary hardening is a software security technique in which binary files are analyzed and modified to protect against common exploits. Binary… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
A shadow stack validates on-stack return addresses and prevents arbitrary code execution vulnerabilities due to malicious returns… 
2019
2019
Programs are developed in a manner so that they execute and fulfill their intended purpose. In doing so, programmers trust the… 
2018
2018
ESA and NASA are moving forward with plans to launch LISA around 2030. With data from the Illustris large-scale cosmological… 
2017
2017
As mobile and multi-homed devices are becoming ubiquitous, the need for a dynamic, yet secure communication protocol is… 
2016
2016
Nowadays control-flow hijacking attacks represents the highest software-based security threat [16]. We want to develop a tool… 
2016
2016
Nowadays control-flow hijacking attacks represents the highest software-based security threat [16]. We want to develop a tool… 
2013
2013
Strengthening of aluminium alloy using precipitation hardening heat treatment involves several processes in order to achieve the… 
2012
2012
  • 2012
  • Corpus ID: 59379024
The structure and mechanical properties of two types of precipitation hardenableaustenite alloys are studied. One is based on Fe… 
1966
1966
Abstract : The addition, to a metallic matrix, of a suitably dispersed second phase is one of the most potent methods of…