Defending against ROP Attacks with Nearly Zero Overhead.
Peng QinCheng TanLei ZhaoYueqiang ChengPublished in: GLOBECOM (2019)
Keyphrases
- ddos attacks
- data corruption
- countermeasures
- denial of service attacks
- dos attacks
- traffic analysis
- security threats
- cryptographic protocols
- chosen plaintext
- malicious attacks
- low overhead
- data sets
- security mechanisms
- security issues
- watermarking algorithm
- watermarking scheme
- information security
- attack detection
- stream cipher
- wireless sensor networks
- security flaws
- neural network