Overview of control-flow hijacking attack and defense techniques for process

Control flow hijacking attack is a common attack against computer software,which brings great harm to computer software security and is a research hotspot in the field of information security.Firstly,from the perspective of the source of attack code,the related research was expounded on process’s co...

Full description

Saved in:
Bibliographic Details
Main Authors: Fengfeng WANG, Tao ZHANG, Weiguang XU, Meng SUN
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2019-12-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2019058
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530059945410560
author Fengfeng WANG
Tao ZHANG
Weiguang XU
Meng SUN
author_facet Fengfeng WANG
Tao ZHANG
Weiguang XU
Meng SUN
author_sort Fengfeng WANG
collection DOAJ
description Control flow hijacking attack is a common attack against computer software,which brings great harm to computer software security and is a research hotspot in the field of information security.Firstly,from the perspective of the source of attack code,the related research was expounded on process’s control flow hijacking attack.Secondly,according to the newest development status of control flow hijacking attack technology,the related defense technologies at home and abroad were introduced based on different defense ideas.Finally,the development trend of control flow hijacking offensive and defensive technology were summarized.
format Article
id doaj-art-6d05e1d64ebc45cfbf9b4a4d30ddc0ed
institution Kabale University
issn 2096-109X
language English
publishDate 2019-12-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-6d05e1d64ebc45cfbf9b4a4d30ddc0ed2025-01-15T03:13:47ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2019-12-015102059556867Overview of control-flow hijacking attack and defense techniques for processFengfeng WANGTao ZHANGWeiguang XUMeng SUNControl flow hijacking attack is a common attack against computer software,which brings great harm to computer software security and is a research hotspot in the field of information security.Firstly,from the perspective of the source of attack code,the related research was expounded on process’s control flow hijacking attack.Secondly,according to the newest development status of control flow hijacking attack technology,the related defense technologies at home and abroad were introduced based on different defense ideas.Finally,the development trend of control flow hijacking offensive and defensive technology were summarized.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2019058software securitycontrol flow hijacking attackscontrol flow integrityrandomization
spellingShingle Fengfeng WANG
Tao ZHANG
Weiguang XU
Meng SUN
Overview of control-flow hijacking attack and defense techniques for process
网络与信息安全学报
software security
control flow hijacking attacks
control flow integrity
randomization
title Overview of control-flow hijacking attack and defense techniques for process
title_full Overview of control-flow hijacking attack and defense techniques for process
title_fullStr Overview of control-flow hijacking attack and defense techniques for process
title_full_unstemmed Overview of control-flow hijacking attack and defense techniques for process
title_short Overview of control-flow hijacking attack and defense techniques for process
title_sort overview of control flow hijacking attack and defense techniques for process
topic software security
control flow hijacking attacks
control flow integrity
randomization
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2019058
work_keys_str_mv AT fengfengwang overviewofcontrolflowhijackingattackanddefensetechniquesforprocess
AT taozhang overviewofcontrolflowhijackingattackanddefensetechniquesforprocess
AT weiguangxu overviewofcontrolflowhijackingattackanddefensetechniquesforprocess
AT mengsun overviewofcontrolflowhijackingattackanddefensetechniquesforprocess