{"page":"212-228","date_updated":"2022-01-06T06:54:34Z","type":"conference","publication":"International Workshop on Security and Trust Management (STM)","language":[{"iso":"eng"}],"main_file_link":[{"url":"http://bodden.de/pubs/fbt+16pshape.pdf"}],"user_id":"5786","citation":{"chicago":"Follner, Andreas, Alexandre Bartel, Hui Peng, Yu-Chen Chang, Kyriakos Ispoglou, Mathias Payer, and Eric Bodden. “PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution.” In International Workshop on Security and Trust Management (STM), 212–28, 2016.","short":"A. Follner, A. Bartel, H. Peng, Y.-C. Chang, K. Ispoglou, M. Payer, E. Bodden, in: International Workshop on Security and Trust Management (STM), 2016, pp. 212–228.","apa":"Follner, A., Bartel, A., Peng, H., Chang, Y.-C., Ispoglou, K., Payer, M., & Bodden, E. (2016). PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution. International Workshop on Security and Trust Management (STM), 212–228.","mla":"Follner, Andreas, et al. “PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution.” International Workshop on Security and Trust Management (STM), 2016, pp. 212–28.","ama":"Follner A, Bartel A, Peng H, et al. PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution. In: International Workshop on Security and Trust Management (STM). ; 2016:212-228.","bibtex":"@inproceedings{Follner_Bartel_Peng_Chang_Ispoglou_Payer_Bodden_2016, title={PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution}, booktitle={International Workshop on Security and Trust Management (STM)}, author={Follner, Andreas and Bartel, Alexandre and Peng, Hui and Chang, Yu-Chen and Ispoglou, Kyriakos and Payer, Mathias and Bodden, Eric}, year={2016}, pages={212–228} }","ieee":"A. Follner et al., “PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution,” in International Workshop on Security and Trust Management (STM), 2016, pp. 212–228."},"date_created":"2020-12-14T11:59:04Z","title":"PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution","_id":"20720","department":[{"_id":"76"}],"author":[{"first_name":"Andreas","full_name":"Follner, Andreas","last_name":"Follner"},{"first_name":"Alexandre","last_name":"Bartel","full_name":"Bartel, Alexandre"},{"full_name":"Peng, Hui","last_name":"Peng","first_name":"Hui"},{"first_name":"Yu-Chen","full_name":"Chang, Yu-Chen","last_name":"Chang"},{"last_name":"Ispoglou","full_name":"Ispoglou, Kyriakos","first_name":"Kyriakos"},{"first_name":"Mathias","last_name":"Payer","full_name":"Payer, Mathias"},{"full_name":"Bodden, Eric","id":"59256","last_name":"Bodden","orcid":"0000-0003-3470-3647","first_name":"Eric"}],"status":"public","year":"2016"}