Smokestack: Thwarting DOP Attacks with Runtime Stack Layout Randomization

Author(s):  
Misiker Tadesse Aga ◽  
Todd Austin
Sign in / Sign up

Export Citation Format

Share Document