Overview of control-flow hijacking attack and defense techniques for process
Control flow hijacking attack is a common attack against computer software,which brings great harm to computer software security and is a research hotspot in the field of information security.Firstly,from the perspective of the source of attack code,the related research was expounded on process’s co...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2019-12-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2019058 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530059945410560 |
---|---|
author | Fengfeng WANG Tao ZHANG Weiguang XU Meng SUN |
author_facet | Fengfeng WANG Tao ZHANG Weiguang XU Meng SUN |
author_sort | Fengfeng WANG |
collection | DOAJ |
description | Control flow hijacking attack is a common attack against computer software,which brings great harm to computer software security and is a research hotspot in the field of information security.Firstly,from the perspective of the source of attack code,the related research was expounded on process’s control flow hijacking attack.Secondly,according to the newest development status of control flow hijacking attack technology,the related defense technologies at home and abroad were introduced based on different defense ideas.Finally,the development trend of control flow hijacking offensive and defensive technology were summarized. |
format | Article |
id | doaj-art-6d05e1d64ebc45cfbf9b4a4d30ddc0ed |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2019-12-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-6d05e1d64ebc45cfbf9b4a4d30ddc0ed2025-01-15T03:13:47ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2019-12-015102059556867Overview of control-flow hijacking attack and defense techniques for processFengfeng WANGTao ZHANGWeiguang XUMeng SUNControl flow hijacking attack is a common attack against computer software,which brings great harm to computer software security and is a research hotspot in the field of information security.Firstly,from the perspective of the source of attack code,the related research was expounded on process’s control flow hijacking attack.Secondly,according to the newest development status of control flow hijacking attack technology,the related defense technologies at home and abroad were introduced based on different defense ideas.Finally,the development trend of control flow hijacking offensive and defensive technology were summarized.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2019058software securitycontrol flow hijacking attackscontrol flow integrityrandomization |
spellingShingle | Fengfeng WANG Tao ZHANG Weiguang XU Meng SUN Overview of control-flow hijacking attack and defense techniques for process 网络与信息安全学报 software security control flow hijacking attacks control flow integrity randomization |
title | Overview of control-flow hijacking attack and defense techniques for process |
title_full | Overview of control-flow hijacking attack and defense techniques for process |
title_fullStr | Overview of control-flow hijacking attack and defense techniques for process |
title_full_unstemmed | Overview of control-flow hijacking attack and defense techniques for process |
title_short | Overview of control-flow hijacking attack and defense techniques for process |
title_sort | overview of control flow hijacking attack and defense techniques for process |
topic | software security control flow hijacking attacks control flow integrity randomization |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2019058 |
work_keys_str_mv | AT fengfengwang overviewofcontrolflowhijackingattackanddefensetechniquesforprocess AT taozhang overviewofcontrolflowhijackingattackanddefensetechniquesforprocess AT weiguangxu overviewofcontrolflowhijackingattackanddefensetechniquesforprocess AT mengsun overviewofcontrolflowhijackingattackanddefensetechniquesforprocess |