Login / Signup
Beasty Memories: The Quest for Practical Defense against Code Reuse Attacks.
Ahmad-Reza Sadeghi
Lucas Davi
Published in:
TrustED@CCS (2014)
Keyphrases
</>
real world
ddos attacks
defense mechanisms
associative memory
network security
malicious attacks
code reuse
neural network
machine learning
metadata
high level
source code
watermarking scheme
countermeasures
security protocols
computer virus