Sign in

FRProtector: Defeating Control Flow Hijacking Through Function-Level Randomization and Transfer Protection.

Jianming FuRui JinYan Lin
Published in: SecureComm (2017)
Keyphrases
  • control flow
  • data flow
  • information technology
  • privacy preserving
  • process model
  • workflow management systems
  • database
  • data sets
  • databases
  • artificial intelligence
  • software engineering
  • reactive systems