Login / Signup

Cloning Your Gadgets: Complete ROP Attack Immunity with Multi-Variant Execution.

Stijn VolckaertBart CoppensBjorn De Sutter
Published in: IEEE Trans. Dependable Secur. Comput. (2016)
Keyphrases
  • information retrieval
  • execution model
  • database
  • social networks
  • decision trees
  • expert systems
  • response time
  • data flow
  • countermeasures
  • active databases
  • plan generation