Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Binary hardening

Binary hardening is a software security technique in which binary files are analyzed and modified to protect against common exploits. Binary… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
ESA and NASA are moving forward with plans to launch LISA around 2030. With data from the Illustris large-scale cosmological… Expand
2017
2017
As mobile and multi-homed devices are becoming ubiquitous, the need for a dynamic, yet secure communication protocol is… Expand
  • figure 1
  • figure 2
  • figure 3
Highly Cited
2017
Highly Cited
2017
Gravitational Waves (GW) have now been detected from stellar-mass black hole binaries, and the first observations of GW from… Expand
  • table 1
  • table 2
  • figure 1
  • figure 2
  • figure 3
2017
2017
Code reuse attacks exploiting memory disclosure vulnerabilities can bypass all deployed mitigations. One promising defense… Expand
  • table I
  • table II
  • table III
  • table V
  • figure 1
2017
2017
We compute the isotropic gravitational wave (GW) background produced by binary supermassive black holes (SBHs) in galactic nuclei… Expand
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 4
Highly Cited
2015
Highly Cited
2015
Applications written in low-level languages without type or memory safety are prone to memory corruption. Attackers gain code… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2012
Highly Cited
2012
Galaxy centers are residing places for supermassive black holes (SMBHs). Galaxy mergers bring SMBHs close together to form… Expand
  • table 1
  • table 2
  • figure 1
  • figure 3
  • figure 4
2009
2009
Precipitation hardening, or aging hardening, is one of the most widely adopted techniques for strengthening of aluminium alloys… Expand
Highly Cited
2006
Highly Cited
2006
Binary supermassive black holes form naturally in galaxy mergers, but their long-term evolution is uncertain. In spherical… Expand
  • figure 1
  • figure 2
  • figure 3
Highly Cited
1998
Highly Cited
1998
A revision of Stodoikiewicz's Monte Carlo code is used to simulate evolution of star clusters. The new method treats each… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5