<--- Back to Details
First PageDocument Content
Computer security / Computing / Compiler construction / Computer programming / Software engineering / Return-oriented programming / Control-flow integrity / Code reuse / Control flow graph / Program analysis / Data-flow analysis / Cyberattack
Date: 2017-05-14 00:24:54
Computer security
Computing
Compiler construction
Computer programming
Software engineering
Return-oriented programming
Control-flow integrity
Code reuse
Control flow graph
Program analysis
Data-flow analysis
Cyberattack

Poster: CRAFTED: Code Reuse Analysis for Trusted and Effective Defense Ethan Johnson Tianqin Zhao John Criswell

Add to Reading List

Source URL: www.ieee-security.org

Download Document from Source Website

File Size: 327,47 KB

Share Document on Facebook

Similar Documents

COMPILER CONSTRUCTION William M. Waite Department of Electrical Engineering University of Colorado Boulder, Colorado 80309

COMPILER CONSTRUCTION William M. Waite Department of Electrical Engineering University of Colorado Boulder, Colorado 80309

DocID: 1u5Ve - View Document

Combining Static and Dynamic Contract Checking for Curry Michael Hanus University of Kiel Programming Languages and Compiler Construction

Combining Static and Dynamic Contract Checking for Curry Michael Hanus University of Kiel Programming Languages and Compiler Construction

DocID: 1tKXN - View Document

CompSci 754: Compiler Construction and Theory John Boyland  Spring 2018 Office Office Hours

CompSci 754: Compiler Construction and Theory John Boyland Spring 2018 Office Office Hours

DocID: 1tCj1 - View Document

On Functional Logic Programming and its Application to Testing Sebastian Fischer Programming Languages and Compiler Construction Department of Computing Science Christian-Albrechts University of Kiel

On Functional Logic Programming and its Application to Testing Sebastian Fischer Programming Languages and Compiler Construction Department of Computing Science Christian-Albrechts University of Kiel

DocID: 1sWAw - View Document

Accurate prediction of the behavior of multithreaded applications in shared caches

Accurate prediction of the behavior of multithreaded applications in shared caches

DocID: 1rtkc - View Document