µShield: Configurable Code-Reuse Attacks Mitigation For Embedded Systems. Abbasi, A., Wetzels, J., Bokslag, W., Zambon, E., & Etalle, S. In International Conference on Network and System Security, pages 694–709, 2017. Springer. bibtex @inproceedings{abbasi2017mu,
title={µShield: Configurable Code-Reuse Attacks Mitigation For
Embedded Systems},
author={Abbasi, Ali and Wetzels, Jos and Bokslag, Wouter and Zambon, Emmanuele and Etalle, Sandro},
booktitle={International Conference on Network and System Security},
pages={694--709},
year={2017},
organization={Springer}
}
Downloads: 0
{"_id":"sy83rxvY429AXnofm","bibbaseid":"abbasi-wetzels-bokslag-zambon-etalle-shieldconfigurablecodereuseattacksmitigationforembeddedsystems-2017","authorIDs":["8GDRtnKa7HgrEaB4z","AHBcZdsmHCWDgtpC7","DH5JdmwxHqaXbBvEA","SkaZcE3z5iJeCHkaJ","TfED66CoJYGCLZYuT","YMq7twBerkTLPzjFA","ZuF937trtie4BQLu7","azQ52wqDwKz7CXhcT","exDrBuNqQrwcXC3at","khBkuJmWPrzrmvsuq"],"author_short":["Abbasi, A.","Wetzels, J.","Bokslag, W.","Zambon, E.","Etalle, S."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"µShield: Configurable Code-Reuse Attacks Mitigation For Embedded Systems","author":[{"propositions":[],"lastnames":["Abbasi"],"firstnames":["Ali"],"suffixes":[]},{"propositions":[],"lastnames":["Wetzels"],"firstnames":["Jos"],"suffixes":[]},{"propositions":[],"lastnames":["Bokslag"],"firstnames":["Wouter"],"suffixes":[]},{"propositions":[],"lastnames":["Zambon"],"firstnames":["Emmanuele"],"suffixes":[]},{"propositions":[],"lastnames":["Etalle"],"firstnames":["Sandro"],"suffixes":[]}],"booktitle":"International Conference on Network and System Security","pages":"694–709","year":"2017","organization":"Springer","bibtex":"@inproceedings{abbasi2017mu,\n title={µShield: Configurable Code-Reuse Attacks Mitigation For\nEmbedded Systems},\n author={Abbasi, Ali and Wetzels, Jos and Bokslag, Wouter and Zambon, Emmanuele and Etalle, Sandro},\n booktitle={International Conference on Network and System Security},\n pages={694--709},\n year={2017},\n organization={Springer}\n}\n\n","author_short":["Abbasi, A.","Wetzels, J.","Bokslag, W.","Zambon, E.","Etalle, S."],"key":"abbasi2017mu","id":"abbasi2017mu","bibbaseid":"abbasi-wetzels-bokslag-zambon-etalle-shieldconfigurablecodereuseattacksmitigationforembeddedsystems-2017","role":"author","urls":{},"metadata":{"authorlinks":{"abbasi, a":"https://bibbase.org/show?bib=https://dblp.org/pid/73/2297-2.bib"}},"downloads":0,"html":""},"bibtype":"inproceedings","biburl":"https://homepage.ruhr-uni-bochum.de/ali.abbasi-i4q/alipub.bib","creationDate":"2020-05-01T22:55:42.584Z","downloads":0,"keywords":[],"search_terms":["shield","configurable","code","reuse","attacks","mitigation","embedded","systems","abbasi","wetzels","bokslag","zambon","etalle"],"title":"µShield: Configurable Code-Reuse Attacks Mitigation For Embedded Systems","year":2017,"dataSources":["mgBXxEwpGG6TrJ3nr"]}