Report copyright - Out Of Control: Overcoming Control-Flow Integrityand return addresses. Control hijacking attacks lead to code-reuse (e.g., return-to-libc [13], ROP [9], and JOP [11], [12]) and code-injection
Please pass captcha verification before submit form