@inproceedings{aga:hal-02384583, TITLE = {{Wrangling in the Power of Code Pointers with ProxyCFI}}, AUTHOR = {Aga, Misiker Tadesse and Holoday, Colton and Austin, Todd}, URL = {https://inria.hal.science/hal-02384583}, NOTE = {Part 6: Source Code Security}, BOOKTITLE = {{33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec)}}, ADDRESS = {Charleston, SC, United States}, EDITOR = {Simon N. Foley}, PUBLISHER = {{Springer International Publishing}}, SERIES = {Data and Applications Security and Privacy XXXIII}, VOLUME = {LNCS-11559}, PAGES = {317-337}, YEAR = {2019}, MONTH = Jul, DOI = {10.1007/978-3-030-22479-0\_17}, KEYWORDS = {CFG mimicry attacks ; CFI ; Pointer proxy}, PDF = {https://inria.hal.science/hal-02384583/file/480962_1_En_17_Chapter.pdf}, HAL_ID = {hal-02384583}, HAL_VERSION = {v1}, }