How to Counter Control Flow Tampering Attacks

Mohsen Sharifi, Mohammad Zoroufi, Alireza Saberi. How to Counter Control Flow Tampering Attacks. In 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 13-16 May 2007, Amman, Jordan. pages 815-818, IEEE, 2007. [doi]

@inproceedings{SharifiZS07,
  title = {How to Counter Control Flow Tampering Attacks},
  author = {Mohsen Sharifi and Mohammad Zoroufi and Alireza Saberi},
  year = {2007},
  doi = {10.1109/AICCSA.2007.370726},
  url = {http://dx.doi.org/10.1109/AICCSA.2007.370726},
  tags = {data-flow},
  researchr = {https://researchr.org/publication/SharifiZS07},
  cites = {0},
  citedby = {0},
  pages = {815-818},
  booktitle = {2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 13-16 May 2007, Amman, Jordan},
  publisher = {IEEE},
}