Countering code-injection attacks with instruction-set randomization.
Gaurav S. KcAngelos D. KeromytisVassilis PrevelakisPublished in: CCS (2003)
Keyphrases
- instruction set
- injection attacks
- instruction set architecture
- sql injection
- floating point
- computer architecture
- application specific
- source code
- collaborative recommender systems
- countermeasures
- database
- embedded systems
- web applications
- privacy preserving
- recommender systems
- databases
- security issues
- database systems