@dblp

Data Is Flowing in the Wind: A Review of Data-Flow Integrity Methods to Overcome Non-Control-Data Attacks.

, and . SOCO-CISIS-ICEUTE, volume 527 of Advances in Intelligent Systems and Computing, page 536-544. (2016)

Links and resources

Tags