code reuse attacks

What is a code reuse attack?

XOM-switch: Hiding Your Code from Advanced Code Reuse Attacks In One Shot

Ali Abbasi - Configurable Code-Reuse Attacks Mitigation

An Introduction to Jump-Oriented Programming: An Alternative Code-Reuse Attack

XOM-switch: Hiding Your Code from Advanced Code Reuse Attacks In One Shot

A Tough call: Mitigating Advanced Code-Reuse Attacks At The Binary Level

RuhrSec 2016: 'Keynote: Code-Reuse Attacks and Beyond', Prof. Dr. Thorsten Holz

RuhrSec 2016: 'On Securing Legacy Software Against Code-Reuse Attacks', Lucas Vincenzo Davi

XOM switch Hiding Your Code from Advanced Code Reuse Attacks In One Shot

Lesson 170 - Managing Code Reuse in Microservices

A Generic Technique for Automatically Finding Defense-Aware Code Reuse Attacks (CCS 2020)

Counterfeit Object-oriented Programming

This video is about our tool iTOP which is used for automating code reuse attacks.

ASPLOS'20 - Session 8A - Hurdle: Securing Jump Instructions Against Code Reuse Attacks

Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code-Inference Attacks

Lecture 5 - Code reuse attacks, advanced exploits, discussion

Hurdle: Securing Jump Instructions Against Code Reuse Attacks

USENIX Security '18 - The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX

A Tough call Mitigating Advanced Code Reuse Attacks At The Binary Level

Readactor: Practical Code Randomization Resilient to Memory Disclosure

Hardware-Assisted Fine-Grained Code-Reuse Attack Detection

Saffire: Context-sensitive Function Specialization against Code Reuse Attacks | IEEE Euro S&P 2020

CP2020 Constraint-Based Software Diversification for Efficient Mitigation of Code-Reuse Attacks

visit shbcf.ru