Login / Signup

Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach.

Zhijiao ZhangYa-Shuai LüYu ChenYongqiang LuYuanchun Shi
Published in: SEC (2015)
Keyphrases