Hurdle: Securing Jump Instructions Against Code Reuse Attacks.
Christian DeLozierKavya LakshminarayananGilles PokamJoseph DeviettiPublished in: ASPLOS (2020)
Keyphrases
- code reuse
- source code
- software engineering
- countermeasures
- information security
- markov chain
- software evolution
- traffic analysis
- malicious attacks
- security risks
- watermarking scheme
- software development
- attack detection
- denial of service attacks
- open source
- multi agent
- design patterns
- security threats
- malicious users
- cryptographic protocols
- software projects
- watermarking technique
- security mechanisms
- computer programs
- data mining
- digital images
- wireless sensor networks
- relational databases
- multi agent systems
- cooperative
- case study
- artificial intelligence