<--- Back to Details
First PageDocument Content
Computer security / Computing / Compiler construction / Computer programming / Software engineering / Return-oriented programming / Control-flow integrity / Code reuse / Control flow graph / Program analysis / Data-flow analysis / Cyberattack
Date: 2017-05-14 00:24:54
Computer security
Computing
Compiler construction
Computer programming
Software engineering
Return-oriented programming
Control-flow integrity
Code reuse
Control flow graph
Program analysis
Data-flow analysis
Cyberattack

Poster: CRAFTED: Code Reuse Analysis for Trusted and Effective Defense Ethan Johnson Tianqin Zhao John Criswell

Add to Reading List

Source URL: www.ieee-security.org

Download Document from Source Website

File Size: 327,47 KB

Share Document on Facebook

Similar Documents

LNCSSound Control-Flow Graph Extraction for Java Programs with Exceptions

LNCSSound Control-Flow Graph Extraction for Java Programs with Exceptions

DocID: 1t07S - View Document

A Theory for Control-Flow Graph Exploration Stephan Arlt1 , Philipp R¨ ummer2 , and Martin Sch¨ af1 1

A Theory for Control-Flow Graph Exploration Stephan Arlt1 , Philipp R¨ ummer2 , and Martin Sch¨ af1 1

DocID: 1sWE2 - View Document

Control-Flow Analysis Last time – Undergraduate compilers in a day Today – Control-flow analysis – Building basic blocks

Control-Flow Analysis Last time – Undergraduate compilers in a day Today – Control-flow analysis – Building basic blocks

DocID: 1rrVx - View Document

Database-Backed Program Analysis for Scalable Error Propagation Cathrin Weiss Cindy Rubio-González

Database-Backed Program Analysis for Scalable Error Propagation Cathrin Weiss Cindy Rubio-González

DocID: 1rihM - View Document

Distributed ADMM for Model Predictive Control and Congestion Control João F. C. Mota1,2 , João M. F. Xavier2 , Pedro M. Q. Aguiar2 , and Markus Püschel3 Abstract— Many problems in control can be modeled as an optimi

Distributed ADMM for Model Predictive Control and Congestion Control João F. C. Mota1,2 , João M. F. Xavier2 , Pedro M. Q. Aguiar2 , and Markus Püschel3 Abstract— Many problems in control can be modeled as an optimi

DocID: 1rbVi - View Document