| 12417106 |
Control flow integrity enforcement at scale |
Richard John Black, Timothy William Burrell, Miguel Oom Temudo de Castro, Manuel Costa, Matthew Ryan Miller |
2025-09-16 |
| 12086237 |
Securely redirecting system service routines |
Haim Cohen, Graham John Harper, Mehmet Iyigun |
2024-09-10 |
| 11922168 |
Stack traces using shadow stack |
Ben Niu, Gregory J. Colombo, Weidong Cui, Jason Lin |
2024-03-05 |
| 11720374 |
Dynamically overriding a function based on a capability set |
Pranav Kant, Joseph Norman BIALEK, Xiang Fan, Yongkang Zhu, Gabriel Thomas Kodjo Dos Reis +6 more |
2023-08-08 |
| 11709931 |
Shadow stack violation enforcement at module granularity |
Jason Lin, Jin LIN, Gregory J. Colombo, Niraj Majmudar, Mehmet Iyigun +1 more |
2023-07-25 |
| 11379579 |
Shadow stack violation enforcement at module granularity |
Jason Lin, Jin LIN, Gregory J. Colombo, Niraj Majmudar, Mehmet Iyigun +1 more |
2022-07-05 |
| 11294682 |
Stack traces using shadow stack |
Ben Niu, Gregory J. Colombo, Weidong Cui, Jason Lin |
2022-04-05 |
| 11003464 |
Control flow integrity enforcement at scale |
Richard John Black, Timothy William Burrell, Miguel Oom Temudo de Castro, Manuel Costa, Matthew Ryan Miller |
2021-05-11 |
| 10963567 |
Speculative side-channel attack mitigations |
Jonathan E. Lange |
2021-03-30 |
| 10831886 |
Virtual machine manager facilitated selective code integrity enforcement |
David Alan Hepkin |
2020-11-10 |
| 10705850 |
Stack frame unwinding for exception handling |
Pedro Teixeira, Neeraj Singh |
2020-07-07 |
| 10621342 |
Speculative side channel attack mitigation using uncacheable memory |
Sai Ganesh Ramachandran, Xin David ZHANG, Arun U. Kishan, David Alan Hepkin |
2020-04-14 |
| 10198572 |
Virtual machine manager facilitated selective code integrity enforcement |
David Alan Hepkin |
2019-02-05 |
| 10157268 |
Return flow guard using control stack identified by processor register |
Jordan Thomas Rabet, Matthew Ryan Miller, Adam Zabrocki, Shawn Daniel Hoffman, Landy Wang +1 more |
2018-12-18 |
| 9348533 |
Memory image capture via memory write from a running system |
Tai Hing Tse, Landy Wang, Yimin Deng, Yevgeniy Bak, Chiuchin Chen |
2016-05-24 |
| 9021587 |
Detecting software vulnerabilities in an isolated computing environment |
Nitin Kumar Goel, Matthew Ryan Miller, Navin Narayan Pai, Grzegorz WRÓBLEWSKI, Gregory Justice Riggs |
2015-04-28 |
| 8683583 |
Using virtual table protections to prevent the exploitation of object corruption vulnerabilities |
Matthew Ryan Miller, Timothy William Burrell |
2014-03-25 |