Method against process control-flow hijacking based on mimic defense

To defeat the attack of process control flow hijacking, a threat model was established from the point of vulnerability utilization, and the fortress defense to cut off the key vulnerability utilization path was proposed.On the basis of studying the principle of mimic defense, a threat model of proce...

Full description

Bibliographic Details
Main Authors: Chuanxing PAN, Zheng ZHANG, Bolin MA, Yuan YAO, Xinsheng JI
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2021-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2021013