Merkliste 
 1 Ergebnisse 
 
1

Randomized instruction set emulation to disrupt binary code..:

, In: Proceedings of the 10th ACM conference on Computer and communications security,