Login / Signup
Methodologies for Quantifying (Re-)randomization Security and Timing under JIT-ROP.
Salman Ahmed
Ya Xiao
Kevin Z. Snow
Gang Tan
Fabian Monrose
Danfeng (Daphne) Yao
Published in:
CCS (2020)
Keyphrases
</>
information security
access control
security requirements
intrusion detection
security policies
neural network
security problems
security issues
privacy preserving
information assurance
network security
database systems
human operators
security measures
industry standard
security management
data mining
security protocols
real world
security vulnerabilities
high security
security systems
security analysis
computer security
security mechanisms
operating system
statistical databases