1. Machine learning under attack: Vulnerability exploitation and security measures;Biggio,2016
2. ROP is still dangerous: Breaking modern defenses;Carlini,2014
3. On the detection of custom memory allocators in c binaries;Chen;Empir Softw Eng,2016
4. Ropecker: A generic and practical approach for defending against ROP attack;Cheng,2014
5. Micro-virtualization memory tracing to detect and prevent spraying attacks;Cristalli,2016