{"_id":"sSFXEWHrHXEQbJBPa","bibbaseid":"jacobson-bernat-williams-miller-detectingcodereuseattackswithamodelofconformantprogramexecution-2014","downloads":0,"creationDate":"2014-12-14T05:19:29.907Z","title":"Detecting Code Reuse Attacks with a Model of Conformant Program Execution","author_short":["Jacobson, E. R.","Bernat, A. R.","Williams, W. R.","Miller, B. P."],"year":2014,"bibtype":"inproceedings","biburl":"http://www.dblp.org/rec/bibtex/conf/essos/JacobsonBWM14","bibdata":{"title":"Detecting Code Reuse Attacks with a Model of Conformant Program Execution","author":["Emily R. Jacobson","Andrew R. Bernat","William R. Williams","Barton P. Miller"],"author_short":["Jacobson, E. R.","Bernat, A. R.","Williams, W. R.","Miller, B. P."],"bibtype":"inproceedings","type":"inproceedings","year":"2014","key":"dblp1557631","id":"dblp1557631","biburl":"http://www.dblp.org/rec/bibtex/conf/essos/JacobsonBWM14","url":"http://dx.doi.org/10.1007/978-3-319-04897-0_1","conference":"ESSoS","pages":"1-18","text":"ESSoS 2014:1-18","booktitle":"Proceedings of Engineering Secure Software and Systems (ESSoS)","bibtex":"@inproceedings{ dblp1557631,\n title = {Detecting Code Reuse Attacks with a Model of Conformant Program Execution},\n author = {Emily R. Jacobson and Andrew R. Bernat and William R. Williams and Barton P. Miller},\n author_short = {Jacobson, E. R. and Bernat, A. R. and Williams, W. R. and Miller, B. P.},\n bibtype = {inproceedings},\n type = {inproceedings},\n year = {2014},\n key = {dblp1557631},\n id = {dblp1557631},\n biburl = {http://www.dblp.org/rec/bibtex/conf/essos/JacobsonBWM14},\n url = {http://dx.doi.org/10.1007/978-3-319-04897-0_1},\n conference = {ESSoS},\n pages = {1-18},\n text = {ESSoS 2014:1-18},\n booktitle = {Proceedings of Engineering Secure Software and Systems (ESSoS)}\n}","bibbaseid":"jacobson-bernat-williams-miller-detectingcodereuseattackswithamodelofconformantprogramexecution-2014","role":"author","urls":{"Paper":"http://dx.doi.org/10.1007/978-3-319-04897-0_1"},"downloads":0},"search_terms":["detecting","code","reuse","attacks","model","conformant","program","execution","jacobson","bernat","williams","miller"],"keywords":[],"authorIDs":[],"dataSources":["PxY9oF7iiNobywtm3"]}