About Detection of Code Reuse Attacks

When exploiting software vulnerabilities such as buffer overflows, code reuse techniques are often used today. Such attacks allow you to bypass the protection against the execution of code in the stack, which is implemented at the software and hardware level in modern information systems. At the hea...

Full description

Saved in:
Bibliographic Details
Main Author: Yury V. Kosolapov
Format: Article
Language:English
Published: Yaroslavl State University 2019-06-01
Series:Моделирование и анализ информационных систем
Subjects:
Online Access:https://www.mais-journal.ru/jour/article/view/1213
Tags: Add Tag
No Tags, Be the first to tag this record!