JiuJITsu: Removing Gadgets with Safe Register Allocation for JIT Code Generation | ACM Transactions...
Code-reuse attacks have the capability to craft malicious instructions from small code fragments, commonly referred to as “gadgets.” These gadgets are generated by JIT (Just-In-Time) engines as...