Login / Signup

DROPSYS: Detection of ROP attacks using system information.

Seon Kwon KimHongjoo JinKyungho JooJiwon LeeDong Hoon Lee
Published in: Comput. Secur. (2024)
Keyphrases
  • prior knowledge
  • end users
  • information sources
  • data sets
  • databases
  • keywords
  • detection algorithm
  • metadata
  • email
  • domain knowledge
  • digital images
  • higher level
  • raw data