Research progress in code reuse attacking and defending

Code reuse attacks make use of binary code existed in the attacked target to perform attack action, such technique breaks out the traditional assumption that malicious behavior always be introduced from the outside,it is representative sample of the advanced memory corruption techniques and also the...

Full description

Bibliographic Details
Main Authors: QIAO Xiangdong, GUO Rongxiao, ZHAO Yong
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2018-03-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2018017