First Page | Document Content | |
---|---|---|
Date: 2017-05-14 00:24:54Computer security Computing Compiler construction Computer programming Software engineering Return-oriented programming Control-flow integrity Code reuse Control flow graph Program analysis Data-flow analysis Cyberattack | Poster: CRAFTED: Code Reuse Analysis for Trusted and Effective Defense Ethan Johnson Tianqin Zhao John CriswellAdd to Reading ListSource URL: www.ieee-security.orgDownload Document from Source WebsiteFile Size: 327,47 KBShare Document on Facebook |