Function risk assessment under memory leakage
Code reuse attack (CRA), specifically reusing and then reconstructing the codes (gadgets) already existed in programs and libraries, is widely exploited in software attacks. Admittedly, determination of the location of the gadgets consisted of target instructions along with control flow transfer ins...
Saved in:
Main Authors: | FU, Jianming, JIN, Rui, LIN, Yan, JIANG, Baihe, GUO, Zhengwei |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2018
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/4393 https://ink.library.smu.edu.sg/context/sis_research/article/5396/viewcontent/Function_risk_assessment_under_memory_leakage_2018_av.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
LEAP: Leakage-abuse attack on efficiently deployable, efficiently searchable encryption with partially known dataset
by: NING, Jianting, et al.
Published: (2021) -
Strongly leakage resilient authenticated key exchange, revisited
by: YANG, Guomin, et al.
Published: (2019) -
Update recovery attacks on encrypted database within two updates using range queries leakage
by: NING, Jianting, et al.
Published: (2022) -
Strongly leakage-resilient authenticated key exchange
by: CHEN, Rongmao, et al.
Published: (2016) -
Towards Secure and Usable Leakage-Resilient Password Entry
by: YAN, Qiang
Published: (2013)