Inproceedings,

Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques with No Native Executable Code.

, and .
WOOT, page 91-102. USENIX Association, (2011)

Meta data

Tags

Users

  • @dblp

Comments and Reviews