Login / Signup
Control Flow and Code Integrity for COTS binaries: An Effective Defense Against Real-World ROP Attacks.
Mingwei Zhang
R. Sekar
Published in:
ACSAC (2015)
Keyphrases
</>
control flow
data flow
real world
java card
process model
software testing
databases
reactive systems
artificial intelligence
workflow management systems
training set
source code
transition systems
case study
intrusion detection
life cycle
modeling language
business process models