Sign in

Detecting Non-Control-Flow Hijacking Attacks Using Contextual Execution Information.

Gildo TorresZhiliu YangZander BlasingameJames BruskaChen Liu
Published in: HASP@ISCA (2019)
Keyphrases
  • control flow
  • data flow
  • contextual information
  • artificial intelligence
  • data sets
  • case study