Method against process control-flow hijacking based on mimic defense
To defeat the attack of process control flow hijacking, a threat model was established from the point of vulnerability utilization, and the fortress defense to cut off the key vulnerability utilization path was proposed.On the basis of studying the principle of mimic defense, a threat model of proce...
Saved in:
Main Authors: | Chuanxing PAN, Zheng ZHANG, Bolin MA, Yuan YAO, Xinsheng JI |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2021-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021013/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Meaning and Vision of Mimic Computing and Mimic Security Defense
by: Jiangxing Wu
Published: (2014-07-01) -
Markov game modeling of mimic defense and defense strategy determination
by: Xingming ZHANG, et al.
Published: (2018-10-01) -
Research progress of mimic multi-execution scheduling algorithm
by: Zhengbin ZHU, et al.
Published: (2021-05-01) -
Modeling of the mimic defense based on heterogeneous redundancy
by: Junning QIN, et al.
Published: (2020-05-01) -
Mimic defense authentication method for physical access control
by: Qinglei ZHOU, et al.
Published: (2020-06-01)