This document has been published in the Federal Register. Use the PDF linked in the document sidebar for the official electronic format.
Abstract: Recently, numerous effective defensive strategies like ASLR and execute-no-read have been put forward to counter code-reuse attacks in software systems. These methods safeguard systems ...
Abstract: Java offers the Java Native Interface (JNI), which allows programs running in the Java Virtual Machine to invoke and be manipulated by native applications and libraries written in other ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results