Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains.
Moritz SchlögelTim BlazytkoJulius BaslerFabian HemmerThorsten HolzPublished in: ESORICS (1) (2021)
Keyphrases
- code reuse
- source code
- software engineering
- countermeasures
- software evolution
- malicious attacks
- traffic analysis
- denial of service attacks
- design patterns
- watermarking algorithm
- security mechanisms
- chosen plaintext
- security threats
- security protocols
- computer security
- watermarking scheme
- software projects
- petri net
- software systems
- synthesized images
- detecting malicious
- cooperative
- neural network