Enes Göktas

Google Scholar
10 publications in security and cryptology related venues
Year
Venue
Title
2016
conf/uss
Undermining Information Hiding (and What to Do about It).
2014
conf/uss
Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard.
Filters
Years:  to