Breaking the memory secrecy assumption
- 31 March 2009
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM) in Proceedings of the Second European Workshop on System Security - EUROSEC '09
Abstract
No abstract availableKeywords
This publication has 5 references indexed in Scilit:
- Data Space RandomizationLecture Notes in Computer Science, 2009
- Known/Chosen Key Attacks against Software Instruction Set RandomizationTwenty-Third Annual Computer Security Applications Conference (ACSAC 2007), 2006
- On the effectiveness of address-space randomizationPublished by Association for Computing Machinery (ACM) ,2004
- Randomized instruction set emulation to disrupt binary code injection attacksPublished by Association for Computing Machinery (ACM) ,2003
- Countering code-injection attacks with instruction-set randomizationPublished by Association for Computing Machinery (ACM) ,2003