Cited By
View all- Metcalf LSpring J(2021)The Ecosystem of Detection and Blocklisting of Domain GenerationDigital Threats: Research and Practice10.1145/34239512:3(1-22)Online publication date: 8-Jun-2021
These days, not only are businesses having to contend with increasingly sophisticated attacks on data, they are also facing a serious skills gap within the professions that should be responsible for preventing these attacks. In the security landscape, ...
The number and complexity of Trusted Applications (TAs, applications running in Trusted Execution Environments— TEEs) deployed on mobile devices has exploded. A vulnerability in a single TA impacts the security of the entire device. Thus, vendors must ...
Return-oriented programming (ROP) is an effective code-reuse attack in which short code sequences (i.e., gadgets) ending in a ret instruction are found within existing binaries and then executed by taking control of the call stack. The shadow stack, ...
USENIX Association
United States