Automatic exploitation generation method of write-what-where vulnerability
To solve the problem that the current vulnerability automatic exploitation generation methods cannot automatically generate control-flow-hijacking exploitation from write-what-where, a method of automatic exploitation generation for write-what-where was proposed.First, the write-what-where vulnerabi...
Saved in:
Main Authors: | Huafeng HUANG, Purui SU, Yi YANG, Xiangkun JIA |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2022-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2022003/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A general attack model based on Android system vulnerability
by: Xihai DENG, et al.
Published: (2016-10-01) -
Effect of the Two Types of Exploitation on Organizational Ambidexterity and Firm Performance: Analysis in the Japanese Video Game Industry
by: Taiki ITO
Published: (2022-09-01) -
L’exploitation financière des secteurs populaires argentins
by: Pablo Ignacio Chena, et al.
Published: (2018-01-01) -
The “Miss Curvy Uganda” pageant: representation, commodification and exploitation of women’s bodies
by: Francis Akena, Adyanga
Published: (2020) -
Exploit detection based on illegal control flow transfers identification
by: Ming-hua WANG, et al.
Published: (2014-09-01)