Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,400,060 papers from all fields of science
Search
Sign In
Create Free Account
Binary hardening
Binary hardening is a software security technique in which binary files are analyzed and modified to protect against common exploits. Binary…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
3 relations
Address space layout randomization
Code injection
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
ShadowGuard : Optimizing the Policy and Mechanism of Shadow Stack Instrumentation using Binary Static Analysis
Buddhika Chamith
,
Xiaozhu Meng
,
Ryan Newton
arXiv.org
2020
Corpus ID: 211146226
A shadow stack validates on-stack return addresses and prevents arbitrary code execution vulnerabilities due to malicious returns…
Expand
2019
2019
UnderTracker: Binary Hardening Through Execution Flow Verification
R. Shrivastava
,
C. Hota
,
Govind Mittal
,
Z. Akhtar
Secure Knowledge Management
2019
Corpus ID: 212665471
Programs are developed in a manner so that they execute and fulfill their intended purpose. In doing so, programmers trust the…
Expand
2018
2018
Probing Massive Black Hole Populations and Their Environments with LISA
Michael L. Katz
2018
Corpus ID: 125606159
ESA and NASA are moving forward with plans to launch LISA around 2030. With data from the Illustris large-scale cosmological…
Expand
2017
2017
Hardening Opportunistic HIP
Adel Fuchs
,
Ariel Stulman
,
A. Gurtov
International Conference on Modeling, Analysis…
2017
Corpus ID: 3352657
As mobile and multi-homed devices are becoming ubiquitous, the need for a dynamic, yet secure communication protocol is…
Expand
2016
2016
Measuring Counterfeit Object-oriented Programming Attack Surface Reduction in Binaries
C. Eckert
2016
Corpus ID: 13930695
Nowadays control-flow hijacking attacks represents the highest software-based security threat [16]. We want to develop a tool…
Expand
2016
2016
Measuring COOP Attack Surface Reduction
C. Eckert
2016
Corpus ID: 14583250
Nowadays control-flow hijacking attacks represents the highest software-based security threat [16]. We want to develop a tool…
Expand
2013
2013
Strengthening of aluminium alloy 6061 by using precipitation hardening heat treatment
Amir Izzul Hazwan
2013
Corpus ID: 56195594
Strengthening of aluminium alloy using precipitation hardening heat treatment involves several processes in order to achieve the…
Expand
2012
2012
Lawrence Berkeley National Laboratory Recent Work Title THE ENHANCEMENT OF SUBSTRUCTURE STRENGTHENING OF MARTENSITE Permalink
2012
Corpus ID: 59379024
The structure and mechanical properties of two types of precipitation hardenableaustenite alloys are studied. One is based on Fe…
Expand
1966
1966
Basic studies on dispersion hardening
L. J. Bonis
,
R. Grierson
1966
Corpus ID: 133696719
Abstract : The addition, to a metallic matrix, of a suitably dispersed second phase is one of the most potent methods of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE