Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Control flow graph

Known as: CFG, Flow control diagrams 
A control flow graph (CFG) in computer science is a representation, using graph notation, of all paths that might be traversed through a program… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
As existing defenses like ASLR, DEP, and stack cookies are not sufficient to stop determined attackers from exploiting our… Expand
  • figure 1
  • table I
  • figure 3
  • table II
  • figure 4
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Control-Flow Integrity (CFI) is a software-hardening technique. It inlines checks into a program so that its execution always… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • table 1
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Constraining dynamic control transfers is a common technique for mitigating software vulnerabilities. This defense has been… Expand
  • figure 1
  • table 1
  • table 2
  • table 5
  • table 3
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Code-reuse attacks are software exploits in which an attacker directs control flow through existing code with a malicious result… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Malware is a pervasive problem in distributed computer and network systems. Identification of malware variants provides great… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 2
  • table 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
This paper presents a new approach to dynamically monitoring operating system kernel integrity, based on a property called state… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 5
  • table 2
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Next generation malware will by be characterized by the intense use of polymorphic and metamorphic techniques aimed at… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
1989
Highly Cited
1989
In optimizing compilers, data structure choices directly influence the power and efficiency of practical program optimization. A… Expand
  • figure 1
  • figure 4
  • figure 5
  • figure 7
  • figure 8
Is this relevant?
Highly Cited
1987
Highly Cited
1987
In this paper we present an intermediate program representation, called the program dependence graph (PDG), that makes explicit… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?