Semantic Restoration and Automatic Transplant for ROP Exploit Script
Exploit script plays an important role in security research.Security researchers need to study how the exploit script trigger and exploit the vulnerability,so as to effectively protect the vulnerable program.However,many exploit scripts obtained from network have poor generality and adaptability.The...
Main Author: | SHI Rui-heng, ZHU Yun-cong, ZHAO Yi-ru, ZHAO Lei |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial office of Computer Science
2022-11-01
|
Series: | Jisuanji kexue |
Subjects: | |
Online Access: | https://www.jsjkx.com/fileup/1002-137X/PDF/1002-137X-2022-49-11-49.pdf |
Similar Items
-
ARG: Automatic ROP Chains Generation
by: Yuan Wei, et al.
Published: (2019-01-01) -
Mayall: A Framework for Desktop JavaScript Auditing and Post-Exploitation Analysis
by: Adam Rapley, et al.
Published: (2018-12-01) -
Searching Malware and Sources of Its Distribution in the Internet
by: L. L. Protsenko
Published: (2011-09-01) -
Design and Implementation of Domain Hijacking Detection System
by: Xue Jupo, et al.
Published: (2015-01-01) -
Fine-Grained Modeling of ROP Vulnerability Exploitation Process under Stack Overflow Based on Petri Nets
by: Liumei Zhang, et al.
Published: (2023-11-01)