<--- Back to Details
First PageDocument Content
Computer security / Computing / Compiler construction / Computer programming / Software engineering / Return-oriented programming / Control-flow integrity / Code reuse / Control flow graph / Program analysis / Data-flow analysis / Cyberattack
Date: 2017-05-14 00:24:54
Computer security
Computing
Compiler construction
Computer programming
Software engineering
Return-oriented programming
Control-flow integrity
Code reuse
Control flow graph
Program analysis
Data-flow analysis
Cyberattack

Poster: CRAFTED: Code Reuse Analysis for Trusted and Effective Defense Ethan Johnson Tianqin Zhao John Criswell

Add to Reading List

Source URL: www.ieee-security.org

Download Document from Source Website

File Size: 327,47 KB

Share Document on Facebook

Similar Documents

Jens Knoop, Uwe Zdun (Hrsg.): Software Engineering 2016, Lecture Notes in Informatics (LNI), Gesellschaft f¨ur Informatik, BonnLearning how to prevent return-oriented programming efficiently David Pfaff 1 Sebas

Jens Knoop, Uwe Zdun (Hrsg.): Software Engineering 2016, Lecture Notes in Informatics (LNI), Gesellschaft f¨ur Informatik, BonnLearning how to prevent return-oriented programming efficiently David Pfaff 1 Sebas

DocID: 1uSQW - View Document

Q: Exploit Hardening Made Easy  Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

DocID: 1rrtf - View Document

PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution Andreas Follner1 , Alexandre Bartel1 , Hui Peng2 , Yu-Chen Chang2 , Kyriakos Ispoglou2 , Mathias Payer2 , and Eric Bodden3 1

PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution Andreas Follner1 , Alexandre Bartel1 , Hui Peng2 , Yu-Chen Chang2 , Kyriakos Ispoglou2 , Mathias Payer2 , and Eric Bodden3 1

DocID: 1rlhb - View Document

Department of Electrical Engineering and Computer Science  MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

DocID: 1qHLq - View Document

doi:The idea is to identify security-critical software bugs so they can be fixed first. By Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumle

doi:The idea is to identify security-critical software bugs so they can be fixed first. By Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumle

DocID: 1qEiC - View Document