Protecting Legacy Code against Control Hijacking via Execution Location Equivalence Checking

Author(s):  
Tobias F. Pfeffer ◽  
Stefan Sydow ◽  
Joachim Fellmuth ◽  
Paula Herber
Computer ◽  
1994 ◽  
Vol 27 (4) ◽  
pp. 55-61 ◽  
Author(s):  
J.M. Scandura

2021 ◽  
Author(s):  
Yu-Neng Wang ◽  
Yun-Rong Luo ◽  
Po-Chun Chien ◽  
Ping-Lun Wang ◽  
Hao-Ren Wang ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document