Login / Signup
DROPSYS: Detection of ROP attacks using system information.
Seon Kwon Kim
Hongjoo Jin
Kyungho Joo
Jiwon Lee
Dong Hoon Lee
Published in:
Comput. Secur. (2024)
Keyphrases
</>
prior knowledge
end users
information sources
data sets
databases
keywords
detection algorithm
metadata
email
domain knowledge
digital images
higher level
raw data