Login / Signup
Cloning Your Gadgets: Complete ROP Attack Immunity with Multi-Variant Execution.
Stijn Volckaert
Bart Coppens
Bjorn De Sutter
Published in:
IEEE Trans. Dependable Secur. Comput. (2016)
Keyphrases
</>
information retrieval
execution model
database
social networks
decision trees
expert systems
response time
data flow
countermeasures
active databases
plan generation