
Defending Control Flow Attack Based on XOR-gate Encryption
YU Y F, ZHANG Y J, WANG P J, LI G
Defending Control Flow Attack Based on XOR-gate Encryption
{{custom_ref.label}} |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
/
〈 |
|
〉 |