Mitigating code-reuse attacks with control-flow locking.
Tyler K. BletschXuxian JiangVincent W. FreehPublished in: ACSAC (2011)
Keyphrases
- control flow
- java card
- code reuse
- data flow
- source code
- software testing
- software engineering
- software evolution
- concurrency control
- process model
- workflow management systems
- transition systems
- business process models
- software development
- modeling language
- database systems
- formal semantics
- reactive systems
- design patterns
- watermarking scheme
- database
- software systems
- test cases
- open source
- object oriented
- information technology
- real world