Login / Signup
What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP Defenses.
Giorgi Maisuradze
Michael Backes
Christian Rossow
Published in:
USENIX Security Symposium (2016)
Keyphrases
</>
evolutionary algorithm
computer vision
case study
bayesian networks
statistical inference
restrictive assumptions