Function risk assessment under memory leakage

Code reuse attack (CRA), specifically reusing and then reconstructing the codes (gadgets) already existed in programs and libraries, is widely exploited in software attacks. Admittedly, determination of the location of the gadgets consisted of target instructions along with control flow transfer ins...

Full description

Saved in:
Bibliographic Details
Main Authors: FU, Jianming, JIN, Rui, LIN, Yan, JIANG, Baihe, GUO, Zhengwei
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2018
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/4393
https://ink.library.smu.edu.sg/context/sis_research/article/5396/viewcontent/Function_risk_assessment_under_memory_leakage_2018_av.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
Be the first to leave a comment!
You must be logged in first