2012 IEEE 18th Pacific Rim International Symposium on Dependable Computing 2012
DOI: 10.1109/prdc.2012.17
|View full text |Cite
|
Sign up to set email alerts
|

Code Reuse Prevention through Control Flow Lazily Check

Abstract: Despite the numerous prevention and protection techniques that have been developed, the exploitation of memory corruption vulnerabilities still represents a serious threat to the security of software systems and networks. Because of the adoption of the write or execute only policy (W X) and address space layout randomization (ASLR), modern operate systems have been strengthened against code injection attacks. However, attackers have responded by employing code reuse attacks, in which software vulnerability is … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
references
References 16 publications
0
0
0
Order By: Relevance