Exploitation Techniques for Data-Oriented Attacks with Existing and Potential Defense Approaches. Cheng, L., Ahmed, S., Liljestrand, H., Nyman, T., Cai, H., Jaeger, T., Asokan, N., & Yao, D. ACM Transactions on Privacy and Security (TOPS), 24(4):1–36, 2021. (impact factor: 1.974)Pdf doi bibtex 14 downloads @article{lcheng21tops,
author = {Long Cheng and Salman Ahmed and Hans Liljestrand and Thomas Nyman and Haipeng Cai and Trent Jaeger and Nadarajah Asokan and Danfeng Yao},
title = {Exploitation Techniques for Data-Oriented Attacks with Existing and Potential Defense Approaches},
year = {2021},
volume={24},
number={4},
pages={1--36},
doi = {10.1145/3462699},
url_pdf = {http://chapering.github.io/pubs/tops21-dop.pdf},
journal = {ACM Transactions on Privacy and Security (TOPS)},
Keywords = {software security, data-oriented attacks, DOP, BOP, branch correlation, frequency anomaly},
note = {(impact factor: 1.974)}
}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
Downloads: 14
{"_id":"mw82gQNvwxpriFY3g","bibbaseid":"cheng-ahmed-liljestrand-nyman-cai-jaeger-asokan-yao-exploitationtechniquesfordataorientedattackswithexistingandpotentialdefenseapproaches-2021","author_short":["Cheng, L.","Ahmed, S.","Liljestrand, H.","Nyman, T.","Cai, H.","Jaeger, T.","Asokan, N.","Yao, D."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Long"],"propositions":[],"lastnames":["Cheng"],"suffixes":[]},{"firstnames":["Salman"],"propositions":[],"lastnames":["Ahmed"],"suffixes":[]},{"firstnames":["Hans"],"propositions":[],"lastnames":["Liljestrand"],"suffixes":[]},{"firstnames":["Thomas"],"propositions":[],"lastnames":["Nyman"],"suffixes":[]},{"firstnames":["Haipeng"],"propositions":[],"lastnames":["Cai"],"suffixes":[]},{"firstnames":["Trent"],"propositions":[],"lastnames":["Jaeger"],"suffixes":[]},{"firstnames":["Nadarajah"],"propositions":[],"lastnames":["Asokan"],"suffixes":[]},{"firstnames":["Danfeng"],"propositions":[],"lastnames":["Yao"],"suffixes":[]}],"title":"Exploitation Techniques for Data-Oriented Attacks with Existing and Potential Defense Approaches","year":"2021","volume":"24","number":"4","pages":"1–36","doi":"10.1145/3462699","url_pdf":"http://chapering.github.io/pubs/tops21-dop.pdf","journal":"ACM Transactions on Privacy and Security (TOPS)","keywords":"software security, data-oriented attacks, DOP, BOP, branch correlation, frequency anomaly","note":"(impact factor: 1.974)","bibtex":"@article{lcheng21tops,\r\n\tauthor = \t {Long Cheng and Salman Ahmed and Hans Liljestrand and Thomas Nyman and Haipeng Cai and Trent Jaeger and Nadarajah Asokan and Danfeng Yao},\r\n\ttitle = \t {Exploitation Techniques for Data-Oriented Attacks with Existing and Potential Defense Approaches},\r\n\tyear = \t {2021},\r\n\tvolume={24},\r\n\tnumber={4},\r\n\tpages={1--36},\r\n\tdoi = {10.1145/3462699},\r\n\turl_pdf = {http://chapering.github.io/pubs/tops21-dop.pdf},\r\n\tjournal = {ACM Transactions on Privacy and Security (TOPS)},\r\n\tKeywords = {software security, data-oriented attacks, DOP, BOP, branch correlation, frequency anomaly},\r\n\tnote = {(impact factor: 1.974)}\r\n}\r\n\r\n\r\n%%%%%%%%%%%%%%%%%%%%%%%%%%%%%\r\n","author_short":["Cheng, L.","Ahmed, S.","Liljestrand, H.","Nyman, T.","Cai, H.","Jaeger, T.","Asokan, N.","Yao, D."],"key":"lcheng21tops","id":"lcheng21tops","bibbaseid":"cheng-ahmed-liljestrand-nyman-cai-jaeger-asokan-yao-exploitationtechniquesfordataorientedattackswithexistingandpotentialdefenseapproaches-2021","role":"author","urls":{" pdf":"http://chapering.github.io/pubs/tops21-dop.pdf"},"keyword":["software security","data-oriented attacks","DOP","BOP","branch correlation","frequency anomaly"],"metadata":{"authorlinks":{}},"downloads":14,"html":""},"bibtype":"article","biburl":"chapering.github.io/pubs/hcaipub.bib","dataSources":["NvyxbNNBAfbe3z6oi"],"keywords":["software security","data-oriented attacks","dop","bop","branch correlation","frequency anomaly"],"search_terms":["exploitation","techniques","data","oriented","attacks","existing","potential","defense","approaches","cheng","ahmed","liljestrand","nyman","cai","jaeger","asokan","yao"],"title":"Exploitation Techniques for Data-Oriented Attacks with Existing and Potential Defense Approaches","year":2021,"downloads":14}