Login / Signup
Protecting Instruction Set Randomization from Code Reuse Attacks.
Roberto Guanciale
Published in:
NordSec (2018)
Keyphrases
</>
instruction set
code reuse
source code
floating point
computer architecture
application specific
embedded systems
software engineering
software evolution
privacy preserving
instruction set architecture
access control
level parallelism
data management
general purpose
data structure
case study