Login / Signup
Survey of Code Reuse Attacks and Comparison of Mitigation Techniques.
Ayman M. El-Zoghby
Marianne A. Azer
Published in:
ICSIE (2020)
Keyphrases
</>
database systems
source code
countermeasures
neural network
wireless sensor networks
life cycle
software evolution
malicious attacks
code reuse