Method against process control-flow hijacking based on mimic defense
To defeat the attack of process control flow hijacking, a threat model was established from the point of vulnerability utilization, and the fortress defense to cut off the key vulnerability utilization path was proposed.On the basis of studying the principle of mimic defense, a threat model of proce...
Váldodahkkit: | , , , , |
---|---|
Materiálatiipa: | Artihkal |
Giella: | zho |
Almmustuhtton: |
Editorial Department of Journal on Communications
2021-01-01
|
Ráidu: | Tongxin xuebao |
Fáttát: | |
Liŋkkat: | http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2021013 |