R Rudd, R Skowyra, D Bigelow, V Dedhia,
T Hobson… - NDSS, 2017 - ndss-symposium.org
Memory corruption vulnerabilities not only allow modification of control data and injection of
malicious payloads; they also allow adversaries to reconnoiter a diversified program …