Research progress in code reuse attacking and defending
Code reuse attacks make use of binary code existed in the attacked target to perform attack action,such technique breaks out the traditional assumption that malicious behavior always be introduced from the outside,it is representative sample of the advanced memory corruption techniques and also the...
Saved in:
Main Authors: | Xiangdong QIAO, Rongxiao GUO, Yong ZHAO |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2018-03-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018017 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Fast reused code tracing method based on simhash and inverted index
by: Yan-chen QIAO, et al.
Published: (2016-11-01) -
Software diversity evaluating method based on gadget feature analysis
by: Genlin XIE, et al.
Published: (2023-06-01) -
Exploring reuse criteria for emergency temporary wooden housing- emphasis on local reuse and relocation
by: Ziyu Jiao, et al.
Published: (2025-02-01) -
Control-flow integrity technology based on the combination of software and hardware
by: LIANG Hao, et al.
Published: (2024-10-01) -
Software diversification method based on binary rewriting
by: Benwei HE, et al.
Published: (2023-04-01)