Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Hardware Assisted Randomization of Data

    Data-oriented attacks are gaining traction thanks to advances in code-centric mitigation techniques for memory corruption vulnerabilities. Previous work on mitigating data-oriented attacks includes Data Space ...

    Brian Belleville, Hyungon Moon in Research in Attacks, Intrusions, and Defen… (2018)