Hardware-Assisted Fine-Grained Code-Reuse Attack Detection
Code-reuse attacks have become the primary exploitation technique for system compromise despite of the recently introduced Data Execution Prevention technique in modern platforms. Different from code injection attacks, they result in unintended control-flow transfer to victim programs without adding...
Saved in:
Main Authors: | YUAN, Pinghai, ZENG, Qingkai, DING, Xuhua |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2015
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/3116 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Layered object-oriented programming : advanced VTable reuse attacks on binary-level defense
by: Wang, Chenyu, et al.
Published: (2021) -
NCQ: Code reuse support for Node.js developers
by: REID, Brittany, et al.
Published: (2023) -
Comprehensively understanding of software project code reuse for Java
by: Zhao, Lida
Published: (2025) -
On the effectiveness of code-reuse-based Android application obfuscation
by: TANG, Xiaoxiao, et al.
Published: (2017) -
Stealthy backdoor attack for code models
by: YANG, Zhou, et al.
Published: (2024)