Mayhem: Targeted Corruption of Register and Stack Variables. Adiletta, A. J., Tol, M. C., Doröz, Y., & Sunar, B. CoRR, 2023.
Paper doi bibtex @article{DBLP:journals/corr/abs-2309-02545,
author = {Andrew J. Adiletta and
M. Caner Tol and
Yarkin Dor{\"{o}}z and
Berk Sunar},
title = {Mayhem: Targeted Corruption of Register and Stack Variables},
journal = {CoRR},
volume = {abs/2309.02545},
year = {2023},
url = {https://doi.org/10.48550/arXiv.2309.02545},
doi = {10.48550/ARXIV.2309.02545},
eprinttype = {arXiv},
eprint = {2309.02545},
timestamp = {Mon, 11 Sep 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2309-02545.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"vnYiskbqXZ6D2mcXM","bibbaseid":"adiletta-tol-dorz-sunar-mayhemtargetedcorruptionofregisterandstackvariables-2023","author_short":["Adiletta, A. J.","Tol, M. C.","Doröz, Y.","Sunar, B."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Andrew","J."],"propositions":[],"lastnames":["Adiletta"],"suffixes":[]},{"firstnames":["M.","Caner"],"propositions":[],"lastnames":["Tol"],"suffixes":[]},{"firstnames":["Yarkin"],"propositions":[],"lastnames":["Doröz"],"suffixes":[]},{"firstnames":["Berk"],"propositions":[],"lastnames":["Sunar"],"suffixes":[]}],"title":"Mayhem: Targeted Corruption of Register and Stack Variables","journal":"CoRR","volume":"abs/2309.02545","year":"2023","url":"https://doi.org/10.48550/arXiv.2309.02545","doi":"10.48550/ARXIV.2309.02545","eprinttype":"arXiv","eprint":"2309.02545","timestamp":"Mon, 11 Sep 2023 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/corr/abs-2309-02545.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/corr/abs-2309-02545,\n author = {Andrew J. Adiletta and\n M. Caner Tol and\n Yarkin Dor{\\\"{o}}z and\n Berk Sunar},\n title = {Mayhem: Targeted Corruption of Register and Stack Variables},\n journal = {CoRR},\n volume = {abs/2309.02545},\n year = {2023},\n url = {https://doi.org/10.48550/arXiv.2309.02545},\n doi = {10.48550/ARXIV.2309.02545},\n eprinttype = {arXiv},\n eprint = {2309.02545},\n timestamp = {Mon, 11 Sep 2023 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/corr/abs-2309-02545.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Adiletta, A. J.","Tol, M. C.","Doröz, Y.","Sunar, B."],"key":"DBLP:journals/corr/abs-2309-02545","id":"DBLP:journals/corr/abs-2309-02545","bibbaseid":"adiletta-tol-dorz-sunar-mayhemtargetedcorruptionofregisterandstackvariables-2023","role":"author","urls":{"Paper":"https://doi.org/10.48550/arXiv.2309.02545"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://dblp.org/pid/91/465.bib","dataSources":["bBdDyT8FXd9bWxx5T"],"keywords":[],"search_terms":["mayhem","targeted","corruption","register","stack","variables","adiletta","tol","doröz","sunar"],"title":"Mayhem: Targeted Corruption of Register and Stack Variables","year":2023}