First Page | Document Content | |
---|---|---|
![]() Date: 2010-01-09 16:10:54Association for Computing Machinery Computing James D. Foley Academia Year of birth missing Computer science IEEE Computer Society Computing Research Association | Source URL: www.cra.orgDownload Document from Source WebsiteFile Size: 182,11 KBShare Document on Facebook |
![]() | IEEE COPYRIGHT LICENSE FORM FOR LIMITED USE WITH IEEE COMPUTER SOCIETY’S EXPERIMENTAL “DELAYED-OPEN ACCESS” MODEL TITLE OF WORK (hereinafter, "the Work"): AUTHOR(S): IEEE PUBLICATION TITLE: 2017 IEEE Symposium on SDocID: 1xUoR - View Document |
![]() | 1 Cloning your Gadgets: Complete ROP Attack Immunity with Multi-Variant Execution Stijn Volckaert, Bart Coppens, and Bjorn De Sutter, Member, IEEE Computer Society Abstract—In this paper, we present Disjoint Code LayoDocID: 1vg1S - View Document |
![]() | Princeton Chapter of ACM / IEEE Computer SocietyDocID: 1vbIV - View Document |
![]() | Princeton Chapter of ACM / IEEE Computer SocietyDocID: 1uO7Q - View Document |
![]() | Princeton Chapter of ACM / IEEE Computer SocietyDocID: 1uHEn - View Document |