We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Distributed hash tables (DHTs) have been prevalent within the Internet community for many years. Crawling a DHT network allows researchers to monitor the behavior of peers, determine their geographic location, and predict their trend, etc. To characterize a DHT network accurately and comprehensively, the measurements should be conducted in the long term,(More)
Control Flow Integrity (CFI) is one of the most promising technique to defend Code-Reuse Attacks (CRAs). Traditional CFI Systems and recent Context-Sensitive CFI use coarse control flow graphs (CFGs) to analyze whether the control flow hijack occurs, left vast space for attackers at indirect call-sites. Coarse CFGs make it difficult to decide which target(More)
  • 1