Date: 2012-08-23 22:16:01Central processing unit Machine code Software bugs Return-oriented programming Computer memory Instruction set architectures Buffer overflow protection Self-modifying code Subroutine Stack Return-to-libc attack Instruction set | | CFIMon: Detecting Violation of Control Flow Integrity using Performance Counters Yubin Xia† ‡, Yutao Liu† ‡, Haibo Chen†, Binyu Zang‡ †Institute of Parallel and Distributed Systems, Shanghai Jiao Tong UniveDocument is deleted from original location. Use the Download Button below to download from the Web Archive.Download Document from Web Archive File Size: 264,59 KB
|