1
Table of Contents: ...Introduction -- Background and Evolution of Code-Reuse Attacks -- Building Control-Flow Integrity...
View full text
Electronic eBook