BLADE
- 4 October 2010
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
- p. 440-450
- https://doi.org/10.1145/1866307.1866356
Abstract
No abstract availableKeywords
This publication has 5 references indexed in Scilit:
- Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection AttacksLecture Notes in Computer Science, 2009
- Application-level isolation and recovery with solitudePublished by Association for Computing Machinery (ACM) ,2008
- A Systematic Approach to Uncover Security Flaws in GUI LogicPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- A multifaceted approach to understanding the botnet phenomenonPublished by Association for Computing Machinery (ACM) ,2006
- PolarisCommunications of the ACM, 2006