Towards automated integrity protection of C++ virtual function tables in binary programs. Gawlik, R. & Holz, T. In Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, New Orleans, LA, USA, December 8-12, 2014, pages 396--405, 2014. Paper doi bibtex @inproceedings{DBLP:conf/acsac/GawlikH14,
author = {Robert Gawlik and
Thorsten Holz},
title = {Towards automated integrity protection of {C++} virtual function tables
in binary programs},
booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference,
{ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
pages = {396--405},
year = {2014},
crossref = {DBLP:conf/acsac/2014},
url = {http://doi.acm.org/10.1145/2664243.2664249},
doi = {10.1145/2664243.2664249},
timestamp = {Sat, 06 Dec 2014 14:20:32 +0100},
biburl = {http://dblp.org/rec/bib/conf/acsac/GawlikH14},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
Downloads: 0
{"_id":"zELeybJHmP7BgYCSP","bibbaseid":"gawlik-holz-towardsautomatedintegrityprotectionofcvirtualfunctiontablesinbinaryprograms-2014","downloads":0,"creationDate":"2017-09-27T10:54:12.892Z","title":"Towards automated integrity protection of C++ virtual function tables in binary programs","author_short":["Gawlik, R.","Holz, T."],"year":2014,"bibtype":"inproceedings","biburl":"http://dblp.org/pers/tb2/h/Holz:Thorsten","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Robert"],"propositions":[],"lastnames":["Gawlik"],"suffixes":[]},{"firstnames":["Thorsten"],"propositions":[],"lastnames":["Holz"],"suffixes":[]}],"title":"Towards automated integrity protection of C++ virtual function tables in binary programs","booktitle":"Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, New Orleans, LA, USA, December 8-12, 2014","pages":"396--405","year":"2014","crossref":"DBLP:conf/acsac/2014","url":"http://doi.acm.org/10.1145/2664243.2664249","doi":"10.1145/2664243.2664249","timestamp":"Sat, 06 Dec 2014 14:20:32 +0100","biburl":"http://dblp.org/rec/bib/conf/acsac/GawlikH14","bibsource":"dblp computer science bibliography, http://dblp.org","bibtex":"@inproceedings{DBLP:conf/acsac/GawlikH14,\n author = {Robert Gawlik and\n Thorsten Holz},\n title = {Towards automated integrity protection of {C++} virtual function tables\n in binary programs},\n booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference,\n {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},\n pages = {396--405},\n year = {2014},\n crossref = {DBLP:conf/acsac/2014},\n url = {http://doi.acm.org/10.1145/2664243.2664249},\n doi = {10.1145/2664243.2664249},\n timestamp = {Sat, 06 Dec 2014 14:20:32 +0100},\n biburl = {http://dblp.org/rec/bib/conf/acsac/GawlikH14},\n bibsource = {dblp computer science bibliography, http://dblp.org}\n}\n\n","author_short":["Gawlik, R.","Holz, T."],"key":"DBLP:conf/acsac/GawlikH14","id":"DBLP:conf/acsac/GawlikH14","bibbaseid":"gawlik-holz-towardsautomatedintegrityprotectionofcvirtualfunctiontablesinbinaryprograms-2014","role":"author","urls":{"Paper":"http://doi.acm.org/10.1145/2664243.2664249"},"downloads":0},"search_terms":["towards","automated","integrity","protection","virtual","function","tables","binary","programs","gawlik","holz"],"keywords":[],"authorIDs":[],"dataSources":["nsffQ5pYkGG38Yzs3"]}