| 12417106 |
Control flow integrity enforcement at scale |
Richard John Black, Timothy William Burrell, Miguel Oom Temudo de Castro, Manuel Costa, Kenneth D. Johnson |
2025-09-16 |
| 11003464 |
Control flow integrity enforcement at scale |
Richard John Black, Timothy William Burrell, Miguel Oom Temudo de Castro, Manuel Costa, Kenneth D. Johnson |
2021-05-11 |
| 10965444 |
Mitigating timing attacks via dynamically triggered time dilation |
Jason Weber, Tobin Titus, Daniel Libby, Brian E. Manthos, Colin Pacitti +3 more |
2021-03-30 |
| 10785017 |
Mitigating timing attacks via dynamically scaled time dilation |
Jason Weber, Tobin Titus, Daniel Libby, Brian E. Manthos, Colin Pacitti +3 more |
2020-09-22 |
| 10157268 |
Return flow guard using control stack identified by processor register |
Jordan Thomas Rabet, Kenneth D. Johnson, Adam Zabrocki, Shawn Daniel Hoffman, Landy Wang +1 more |
2018-12-18 |
| 9871811 |
Identifying security properties of systems from application crash traffic |
John J. Lambert, Matthew Bucher, Darren Ernest Canavor |
2018-01-16 |
| 9021587 |
Detecting software vulnerabilities in an isolated computing environment |
Nitin Kumar Goel, Kenneth D. Johnson, Navin Narayan Pai, Grzegorz WRÓBLEWSKI, Gregory Justice Riggs |
2015-04-28 |
| 8966217 |
Lightweight random memory allocation |
Gregory J. Colombo, Hari R. Pulapaka, Arun U. Kishan, Stephen L. Hufnagel, Garrett Leischner +1 more |
2015-02-24 |
| 8683583 |
Using virtual table protections to prevent the exploitation of object corruption vulnerabilities |
Kenneth D. Johnson, Timothy William Burrell |
2014-03-25 |
| 8671261 |
Lightweight random memory allocation |
Gregory J. Colombo, Hari R. Pulapaka, Arun U. Kishan, Stephen L. Hufnagel, Garrett Leischner +1 more |
2014-03-11 |