Login / Signup
Safe Trans Loader: Mitigation and Prevention of Memory Corruption Attacks for Released Binaries.
Takamichi Saito
Masahiro Yokoyama
Shota Sugawara
Kuniyasu Suzaki
Published in:
IWSEC (2018)
Keyphrases
</>
data corruption
denial of service
source code
dos attacks
memory requirements
watermarking scheme
malicious attacks
memory usage
countermeasures
buffer overflow
virtual memory
reverse engineering
risk management
computing power
control flow
data sets
main memory
digital images
databases