Method against process control-flow hijacking based on mimic defense

To defeat the attack of process control flow hijacking, a threat model was established from the point of vulnerability utilization, and the fortress defense to cut off the key vulnerability utilization path was proposed.On the basis of studying the principle of mimic defense, a threat model of proce...

Olles dieđut

Bibliográfalaš dieđut
Váldodahkkit: Chuanxing PAN, Zheng ZHANG, Bolin MA, Yuan YAO, Xinsheng JI
Materiálatiipa: Artihkal
Giella:zho
Almmustuhtton: Editorial Department of Journal on Communications 2021-01-01
Ráidu:Tongxin xuebao
Fáttát:
Liŋkkat:http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2021013