Research progress in code reuse attacking and defending
Code reuse attacks make use of binary code existed in the attacked target to perform attack action, such technique breaks out the traditional assumption that malicious behavior always be introduced from the outside,it is representative sample of the advanced memory corruption techniques and also the...
Main Authors: | QIAO Xiangdong, GUO Rongxiao, ZHAO Yong |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2018-03-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2018017 |
Similar Items
-
Defense Method Against Code Reuse Attack Based on Real-time Code Loading and Unloading
by: HOU Shang-wen, HUANG Jian-jun, LIANG Bin, YOU Wei, SHI Wen-chang
Published: (2022-10-01) -
Lightweight and Seamless Memory Randomization for Mission-Critical Services in a Cloud Platform
by: Joobeom Yun, et al.
Published: (2020-03-01) -
A survey of researchers’ code sharing and code reuse practices, and assessment of interactive notebook prototypes
by: Lauren Cadwallader, et al.
Published: (2022-08-01) -
Fine-Grained Modeling of ROP Vulnerability Exploitation Process under Stack Overflow Based on Petri Nets
by: Liumei Zhang, et al.
Published: (2023-11-01) -
SGXDump: A Repeatable Code-Reuse Attack for Extracting SGX Enclave Memory
by: HanJae Yoon, et al.
Published: (2022-07-01)