Although there are various ways to exploit software vulnerabilities for malicious attacks, the attacks always result in unexpected behavior in program execution, deviating from wh...
This paper reconsiders the threat posed by Shacham's "return-oriented programming" -- a technique by which WX-style hardware protections are evaded via carefully cr...
Erik Buchanan, Ryan Roemer, Hovav Shacham, Stefan ...
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
—In this paper, we propose a new streaming protocol, namely Dynamic Video Rate Control (DVRC), which enables adaptive video delivery over the Internet. DVRC operates on top of UD...
When building enterprise applications that need to be accessed through a variety of client devices, developers usually strive to implement most of the business logic device-indepen...