Back to Results
First PageMeta Content
Computer security / Computing / Compiler construction / Computer programming / Software engineering / Return-oriented programming / Control-flow integrity / Code reuse / Control flow graph / Program analysis / Data-flow analysis / Cyberattack


Poster: CRAFTED: Code Reuse Analysis for Trusted and Effective Defense Ethan Johnson Tianqin Zhao John Criswell
Add to Reading List

Document Date: 2017-05-14 00:24:54


Open Document

File Size: 327,47 KB

Share Result on Facebook
UPDATE