Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,000,407 papers from all fields of science
Search
Sign In
Create Free Account
Register spring
In computer security, a register spring is a sort of trampoline. It is a bogus return pointer or Structured Exception Handling (SEH) pointer which an…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Call stack
Computer security
Control flow
Dynamic-link library
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Spring Boot Autoconfiguration
K. Reddy
2017
Corpus ID: 64700957
The Spring Boot autoconfiguration mechanism heavily depends on the @Conditional feature. This chapter explores how you can…
Expand
2008
2008
Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets
Ryan Iwahashi
,
Daniela Oliveira
,
+4 authors
Jongsoo Jang
Information Security Conference
2008
Corpus ID: 27871776
With the increased popularity of polymorphic and register spring attacks, exploit signatures intrusion detection systems (IDS…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE