Live Path CFI Against Control Flow Hijacking Attacks.
Mohamad BarbarYulei SuiHongyu ZhangShiping ChenJingling XuePublished in: ACISP (2018)
Keyphrases
- control flow
- java card
- data flow
- software testing
- process model
- countermeasures
- sliding window
- modeling language
- workflow management systems
- databases
- watermarking scheme
- transition systems
- reactive systems
- shortest path
- artificial intelligence
- knowledge representation
- data model
- cooperative
- web services
- information systems