8.7 What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP Defenses
简介
Previous8.5 Data-Oriented Programming: On the Expressiveness of Non-Control Data AttacksNext8.9 Symbolic Execution for Software Testing: Three Decades Later
Last updated