Login / Signup
Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard.
Enes Göktas
Elias Athanasopoulos
Michalis Polychronakis
Herbert Bos
Georgios Portokalidis
Published in:
USENIX Security Symposium (2014)
Keyphrases
</>
total length
maximum number
machine learning
countermeasures
security mechanisms
code reuse
anomaly detection
malicious attacks
terrorist attacks