\mu Shield - Configurable Code-Reuse Attacks Mitigation For Embedded Systems. Abbasi, A., Wetzels, J., Bokslag, W., Zambon, E., & Etalle, S. In Yan, Z., Molva, R., Mazurczyk, W., & Kantola, R., editors, Network and System Security - 11th International Conference, NSS 2017, Helsinki, Finland, August 21-23, 2017, Proceedings, volume 10394, of Lecture Notes in Computer Science, pages 694–709, 2017. Springer.
Paper doi bibtex 1 download @inproceedings{DBLP:conf/nss/AbbasiWBZE17,
author = {Ali Abbasi and
Jos Wetzels and
Wouter Bokslag and
Emmanuele Zambon and
Sandro Etalle},
editor = {Zheng Yan and
Refik Molva and
Wojciech Mazurczyk and
Raimo Kantola},
title = {{\textbackslash}mu Shield - Configurable Code-Reuse Attacks Mitigation
For Embedded Systems},
booktitle = {Network and System Security - 11th International Conference, {NSS}
2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {10394},
pages = {694--709},
publisher = {Springer},
year = {2017},
url = {https://doi.org/10.1007/978-3-319-64701-2\_55},
doi = {10.1007/978-3-319-64701-2\_55},
timestamp = {Sun, 06 Oct 2024 21:12:36 +0200},
biburl = {https://dblp.org/rec/conf/nss/AbbasiWBZE17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 1
{"_id":"ufeBP3jfLDHbpBk5S","bibbaseid":"abbasi-wetzels-bokslag-zambon-etalle-mushieldconfigurablecodereuseattacksmitigationforembeddedsystems-2017","author_short":["Abbasi, A.","Wetzels, J.","Bokslag, W.","Zambon, E.","Etalle, S."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Ali"],"propositions":[],"lastnames":["Abbasi"],"suffixes":[]},{"firstnames":["Jos"],"propositions":[],"lastnames":["Wetzels"],"suffixes":[]},{"firstnames":["Wouter"],"propositions":[],"lastnames":["Bokslag"],"suffixes":[]},{"firstnames":["Emmanuele"],"propositions":[],"lastnames":["Zambon"],"suffixes":[]},{"firstnames":["Sandro"],"propositions":[],"lastnames":["Etalle"],"suffixes":[]}],"editor":[{"firstnames":["Zheng"],"propositions":[],"lastnames":["Yan"],"suffixes":[]},{"firstnames":["Refik"],"propositions":[],"lastnames":["Molva"],"suffixes":[]},{"firstnames":["Wojciech"],"propositions":[],"lastnames":["Mazurczyk"],"suffixes":[]},{"firstnames":["Raimo"],"propositions":[],"lastnames":["Kantola"],"suffixes":[]}],"title":"\\mu Shield - Configurable Code-Reuse Attacks Mitigation For Embedded Systems","booktitle":"Network and System Security - 11th International Conference, NSS 2017, Helsinki, Finland, August 21-23, 2017, Proceedings","series":"Lecture Notes in Computer Science","volume":"10394","pages":"694–709","publisher":"Springer","year":"2017","url":"https://doi.org/10.1007/978-3-319-64701-2\\_55","doi":"10.1007/978-3-319-64701-2_55","timestamp":"Sun, 06 Oct 2024 21:12:36 +0200","biburl":"https://dblp.org/rec/conf/nss/AbbasiWBZE17.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/nss/AbbasiWBZE17,\n author = {Ali Abbasi and\n Jos Wetzels and\n Wouter Bokslag and\n Emmanuele Zambon and\n Sandro Etalle},\n editor = {Zheng Yan and\n Refik Molva and\n Wojciech Mazurczyk and\n Raimo Kantola},\n title = {{\\textbackslash}mu Shield - Configurable Code-Reuse Attacks Mitigation\n For Embedded Systems},\n booktitle = {Network and System Security - 11th International Conference, {NSS}\n 2017, Helsinki, Finland, August 21-23, 2017, Proceedings},\n series = {Lecture Notes in Computer Science},\n volume = {10394},\n pages = {694--709},\n publisher = {Springer},\n year = {2017},\n url = {https://doi.org/10.1007/978-3-319-64701-2\\_55},\n doi = {10.1007/978-3-319-64701-2\\_55},\n timestamp = {Sun, 06 Oct 2024 21:12:36 +0200},\n biburl = {https://dblp.org/rec/conf/nss/AbbasiWBZE17.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Abbasi, A.","Wetzels, J.","Bokslag, W.","Zambon, E.","Etalle, S."],"editor_short":["Yan, Z.","Molva, R.","Mazurczyk, W.","Kantola, R."],"key":"DBLP:conf/nss/AbbasiWBZE17","id":"DBLP:conf/nss/AbbasiWBZE17","bibbaseid":"abbasi-wetzels-bokslag-zambon-etalle-mushieldconfigurablecodereuseattacksmitigationforembeddedsystems-2017","role":"author","urls":{"Paper":"https://doi.org/10.1007/978-3-319-64701-2\\_55"},"metadata":{"authorlinks":{}},"downloads":1},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/73/2297-2.bib","dataSources":["7whi7meiPSmyTF8Y3","4ji2ftG9xHDRDPcZG","9RRnqWppvSHbtx7rD","eqGZWjgQsJSxuxEGv"],"keywords":[],"search_terms":["shield","configurable","code","reuse","attacks","mitigation","embedded","systems","abbasi","wetzels","bokslag","zambon","etalle"],"title":"\\mu Shield - Configurable Code-Reuse Attacks Mitigation For Embedded Systems","year":2017,"downloads":1}