<--- Back to Details
First PageDocument Content
Computer security / Computing / Compiler construction / Computer programming / Software engineering / Return-oriented programming / Control-flow integrity / Code reuse / Control flow graph / Program analysis / Data-flow analysis / Cyberattack
Date: 2017-05-14 00:24:54
Computer security
Computing
Compiler construction
Computer programming
Software engineering
Return-oriented programming
Control-flow integrity
Code reuse
Control flow graph
Program analysis
Data-flow analysis
Cyberattack

Poster: CRAFTED: Code Reuse Analysis for Trusted and Effective Defense Ethan Johnson Tianqin Zhao John Criswell

Add to Reading List

Source URL: www.ieee-security.org

Download Document from Source Website

File Size: 327,47 KB

Share Document on Facebook

Similar Documents

Functional Programming for Compiling and Decompiling Computer-Aided Design

Functional Programming for Compiling and Decompiling Computer-Aided Design

DocID: 1xW3j - View Document

Programming with “Big Code”: Lessons, Techniques and Applications Pavol Bielik1 , Veselin Raychev1 , and Martin Vechev1 1  Department of Computer Science, ETH Zurich, Switzerland

Programming with “Big Code”: Lessons, Techniques and Applications Pavol Bielik1 , Veselin Raychev1 , and Martin Vechev1 1 Department of Computer Science, ETH Zurich, Switzerland

DocID: 1xVVx - View Document

A Case for Query-driven Predicate Answer Set Programming (Position Paper) Gopal Gupta Elmer Salazar, Kyle Marple, Zhuo Chen, Farhad Shakerin Department of Computer Science The University of Texas at Dallas

A Case for Query-driven Predicate Answer Set Programming (Position Paper) Gopal Gupta Elmer Salazar, Kyle Marple, Zhuo Chen, Farhad Shakerin Department of Computer Science The University of Texas at Dallas

DocID: 1xVE0 - View Document

Science of Computer Programming, 14(2-3), 1990, ppAlgorithm Theories and Design Tactics Douglas R. Smith and Michael R. Lowry Kestrel Institute 3260 Hillview Avenue

Science of Computer Programming, 14(2-3), 1990, ppAlgorithm Theories and Design Tactics Douglas R. Smith and Michael R. Lowry Kestrel Institute 3260 Hillview Avenue

DocID: 1xVuR - View Document

A Breadth-First Course in Multicore and Manycore Programming Suzanne Rivoire Sonoma State University Department of Computer Science

A Breadth-First Course in Multicore and Manycore Programming Suzanne Rivoire Sonoma State University Department of Computer Science

DocID: 1xTRO - View Document