Login / Signup
Randomized instruction set emulation to disrupt binary code injection attacks.
Elena Gabriela Barrantes
David H. Ackley
Trek S. Palmer
Darko Stefanovic
Dino Dai Zovi
Published in:
CCS (2003)
Keyphrases
</>
instruction set
binary codes
injection attacks
hamming distance
recommender systems
floating point
computer architecture
application specific
similarity search
collaborative recommender systems
embedded systems
hash functions
website
databases
high dimensional data
similarity measure
data mining