Keyphrases
Attack Strategy
100%
Control-flow Integrity
100%
Memory Errors
42%
Protection Method
28%
Attacker
28%
Vulnerability
14%
Popular
14%
Real System
14%
Execution Flow
14%
Implementation Requirements
14%
Code-reuse Attacks
14%
Partial Attack
14%
Exploitation Techniques
14%
Replay Attack
14%
Malicious Attacks
14%
Indirect Branch
14%
Integrity Protection
14%
Vulnerability Exploitation
14%
Return-to-libc Attack
14%
Implementation Feasibility
14%
Gain Control
14%
Computer Science
Attack Technique
100%
Control Flow
100%
Attackers
42%
Protection Technique
28%
Code Reuse
14%
Running Program
14%
Error Vulnerability
14%
Exploitation Technique
14%
Instruction Pointer
14%
Branch Instruction
14%
Integrity Protection
14%