Key-area cyberspace mimic defense against data-oriented attacks

As modern systems widely deploy protective measures for control data in memory, such as Control-Flow Integrity (CFI), attackers’ ability to manipulate control data is greatly restricted. Consequently, attackers are turning to opportunities to manipulate non-control data in memory (known as Data-Orie...

Celý popis

Podrobná bibliografie
Hlavní autoři: Chen Ping, Wei Jin, Yu Zhuyang, Chen Jiwei
Médium: Článek
Jazyk:English
Vydáno: EDP Sciences 2025-01-01
Edice:Security and Safety
Témata:
On-line přístup:https://sands.edpsciences.org/articles/sands/full_html/2025/01/sands20240008/sands20240008.html