8.3 Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms
Previous8.2 Return-Oriented Programming without ReturnsNext8.4 ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks
Last updated
Last updated