Login / Signup
Hurdle: Securing Jump Instructions Against Code Reuse Attacks.
Christian DeLozier
Kavya Lakshminarayanan
Gilles Pokam
Joseph Devietti
Published in:
ASPLOS (2020)
Keyphrases
</>
code reuse
source code
software engineering
countermeasures
information security
markov chain
software evolution
traffic analysis
malicious attacks
security risks
watermarking scheme
software development
attack detection
denial of service attacks
open source
multi agent
design patterns
security threats
malicious users
cryptographic protocols
software projects
watermarking technique
security mechanisms
computer programs
data mining
digital images
wireless sensor networks
relational databases
multi agent systems
cooperative
case study
artificial intelligence