Sign in

A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level.

Victor van der VeenEnes GöktasMoritz ContagAndre PawlowskiXi ChenSanjay RawatHerbert BosThorsten HolzElias AthanasopoulosCristiano Giuffrida
Published in: IEEE Symposium on Security and Privacy (2016)
Keyphrases
  • higher level
  • watermarking scheme
  • hamming distance
  • traffic analysis
  • databases
  • neural network
  • data mining
  • non binary
  • code reuse