Login / Signup
Detecting Non-Control-Flow Hijacking Attacks Using Contextual Execution Information.
Gildo Torres
Zhiliu Yang
Zander Blasingame
James Bruska
Chen Liu
Published in:
HASP@ISCA (2019)
Keyphrases
</>
control flow
data flow
contextual information
artificial intelligence
data sets
case study