Using run-time randomization against memory corruption attacks on legacy binaries. Chen, X. Ph.D. Thesis, VU Amsterdam, May, 2017. Thesis bibtex 1 download @phdthesis{chen_using_2017,
type = {{PhD} {Thesis}},
title = {Using run-time randomization against memory corruption attacks on legacy binaries},
url = {Thesis=https://research.vu.nl/ws/portalfiles/portal/42579651/complete+dissertation.pdf},
school = {VU Amsterdam},
author = {Chen, Xi},
month = may,
year = {2017},
keywords = {class\_binary, proj\_sharcs, type\_thesis},
}
Downloads: 1
{"_id":"BNkYm9tdfcdpf8Sr2","bibbaseid":"chen-usingruntimerandomizationagainstmemorycorruptionattacksonlegacybinaries-2017","author_short":["Chen, X."],"bibdata":{"bibtype":"phdthesis","type":"PhD Thesis","title":"Using run-time randomization against memory corruption attacks on legacy binaries","school":"VU Amsterdam","author":[{"propositions":[],"lastnames":["Chen"],"firstnames":["Xi"],"suffixes":[]}],"month":"May","year":"2017","keywords":"class_binary, proj_sharcs, type_thesis","bibtex":"@phdthesis{chen_using_2017,\n\ttype = {{PhD} {Thesis}},\n\ttitle = {Using run-time randomization against memory corruption attacks on legacy binaries},\n\turl = {Thesis=https://research.vu.nl/ws/portalfiles/portal/42579651/complete+dissertation.pdf},\n\tschool = {VU Amsterdam},\n\tauthor = {Chen, Xi},\n\tmonth = may,\n\tyear = {2017},\n\tkeywords = {class\\_binary, proj\\_sharcs, type\\_thesis},\n}\n\n","author_short":["Chen, X."],"urlThesis":"https://research.vu.nl/ws/portalfiles/portal/42579651/complete+dissertation.pdf","key":"chen_using_2017","id":"chen_using_2017","bibbaseid":"chen-usingruntimerandomizationagainstmemorycorruptionattacksonlegacybinaries-2017","role":"author","urls":{"Thesis":"https://research.vu.nl/ws/portalfiles/portal/42579651/complete+dissertation.pdf"},"keyword":["class_binary","proj_sharcs","type_thesis"],"metadata":{"authorlinks":{}},"downloads":1},"bibtype":"phdthesis","biburl":"https://download.vusec.net/papers/zotero.php?tag=&full=1&format=bibtex&sort=date","dataSources":["BiiCvZqo4qNuaZKx8","t7bbMv6rDqXsgJLed","9p36fiiXN9DNvEKFW","cEmMXPermWEFsgmMR","LY5xkJFgS2sBQ9umB","gNT6G9pnZroHcqbj3","5nSii3zJRNfbkGqMp","phaSsGovQoFy5qo2Q","GLkTGe3ma9f5R3CMg","iLMsrq6FJma6GoJv6"],"keywords":["class_binary","proj_sharcs","type_thesis"],"search_terms":["using","run","time","randomization","against","memory","corruption","attacks","legacy","binaries","chen"],"title":"Using run-time randomization against memory corruption attacks on legacy binaries","year":2017,"downloads":1}