Key-area cyberspace mimic defense against data-oriented attacks
As modern systems widely deploy protective measures for control data in memory, such as Control-Flow Integrity (CFI), attackers’ ability to manipulate control data is greatly restricted. Consequently, attackers are turning to opportunities to manipulate non-control data in memory (known as Data-Orie...
Hlavní autoři: | , , , |
---|---|
Médium: | Článek |
Jazyk: | English |
Vydáno: |
EDP Sciences
2025-01-01
|
Edice: | Security and Safety |
Témata: | |
On-line přístup: | https://sands.edpsciences.org/articles/sands/full_html/2025/01/sands20240008/sands20240008.html |