Dwarf Frankenstein is still in your memory: tiny code reuse attacks.
AliAkbar SadeghiFarzane AminmansourHamid Reza ShahriariPublished in: ISC Int. J. Inf. Secur. (2017)
Keyphrases
- code reuse
- countermeasures
- source code
- memory usage
- memory requirements
- malicious attacks
- memory size
- associative memory
- chosen plaintext
- databases
- malicious users
- software evolution
- watermarking scheme
- software engineering
- limited memory
- dos attacks
- cryptographic protocols
- security threats
- design patterns
- traffic analysis
- life cycle
- database systems
- machine learning