Methodologies for Quantifying (Re-)randomization Security and Timing under JIT-ROP.
Salman AhmedYa XiaoKevin Z. SnowGang TanFabian MonroseDanfeng (Daphne) YaoPublished in: CCS (2020)
Keyphrases
- information security
- access control
- security requirements
- intrusion detection
- security policies
- neural network
- security problems
- security issues
- privacy preserving
- information assurance
- network security
- database systems
- human operators
- security measures
- industry standard
- security management
- data mining
- security protocols
- real world
- security vulnerabilities
- high security
- security systems
- security analysis
- computer security
- security mechanisms
- operating system
- statistical databases