JITScope: Protecting web users from control-flow hijacking attacks.
Chao ZhangMehrdad NiknamiKevin Zhijie ChenChengyu SongZhaofeng ChenDawn SongPublished in: INFOCOM (2015)
Keyphrases
- web users
- control flow
- data flow
- website
- web mining
- web server
- access patterns
- search queries
- web pages
- user interaction
- web content
- process model
- web usage mining
- query logs
- software testing
- workflow management systems
- log files
- web search
- web documents
- modeling language
- software systems
- training set
- database systems
- case study
- business processes
- information extraction