-
1
Method against process control-flow hijacking based on mimic defense
Published 2021-01-01Subjects: “…control-flow hijacking…”
Get full text
Article -
2
Overview of control-flow hijacking attack and defense techniques for process
Published 2019-12-01Subjects: Get full text
Article -
3
Automatic exploitation generation method of write-what-where vulnerability
Published 2022-01-01Subjects: Get full text
Article