Sciweavers

Share
ESSOS   2014 Engineering Secure Software and Systems
Wall of Fame | Most Viewed ESSOS-2014 Paper
ESSOS
2014
Springer
4 years 12 months ago
Detecting Code Reuse Attacks with a Model of Conformant Program Execution
Abstract. Code reuse attacks circumvent traditional program protection mechanisms such as W ⊕ X by constructing exploits from code already present within a process. Existing tech...
Emily R. Jacobson, Andrew R. Bernat, William R. Wi...
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source83
books