Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Monitoring Control Flow History to Detect Code Reuse Attacks

Full metadata record
DC Field Value Language
dc.contributor.authorLee Gyungho-
dc.date.accessioned2021-08-28T23:22:55Z-
dc.date.available2021-08-28T23:22:55Z-
dc.date.created2021-04-22-
dc.date.issued2015-09-07-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/33148-
dc.publisherWSEAS-
dc.titleMonitoring Control Flow History to Detect Code Reuse Attacks-
dc.title.alternativeMonitoring Control Flow History to Detect Code Reuse Attacks-
dc.typeConference-
dc.contributor.affiliatedAuthorLee Gyungho-
dc.identifier.bibliographicCitation14th Int’l Conf. On APPLICATIONS of COMPUTER ENGINEERING (ACE '15), pp.90 - 94-
dc.relation.isPartOf14th Int’l Conf. On APPLICATIONS of COMPUTER ENGINEERING (ACE '15)-
dc.relation.isPartOfRecent Advances on Computer Engineering-
dc.citation.title14th Int’l Conf. On APPLICATIONS of COMPUTER ENGINEERING (ACE '15)-
dc.citation.startPage90-
dc.citation.endPage94-
dc.citation.conferencePlaceKO-
dc.citation.conferenceDate2015-09-05-
dc.type.rimsCONF-
dc.description.journalClass1-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Informatics > Department of Computer Science and Engineering > 2. Conference Papers

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE