Tom Melham

Google Scholar
3 publications in security and cryptology related venues
Year
Venue
Title
2025
conf/uss
Synthesis of Code-Reuse Attacks from p-code Programs.
Mark DenHoed Tom Melham
2018
conf/uss
Automatic Heap Layout Manipulation for Exploitation.
Filters
Years:  to