Hardware-Assisted Fine-Grained Code-Reuse Attack Detection
Code-reuse attacks have become the primary exploitation technique for system compromise despite of the recently introduced Data Execution Prevention technique in modern platforms. Different from code injection attacks, they result in unintended control-flow transfer to victim programs without adding...
Saved in:
Main Authors: | YUAN, Pinghai, ZENG, Qingkai, DING, Xuhua |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2015
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/3116 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Layered object-oriented programming : advanced VTable reuse attacks on binary-level defense
by: Wang, Chenyu, et al.
Published: (2021) -
NCQ: Code reuse support for Node.js developers
by: REID, Brittany, et al.
Published: (2023) -
On the effectiveness of code-reuse-based Android application obfuscation
by: TANG, Xiaoxiao, et al.
Published: (2017) -
Stealthy backdoor attack for code models
by: YANG, Zhou, et al.
Published: (2024) -
Multiple Fault Attack on PRESENT with a Hardware Trojan Implementation in FPGA
by: Breier, Jakub, et al.
Published: (2016)