Exploit detection based on illegal control flow transfers identification
In order to deal with exploit attacks such as APT,an approach was proposed to detect exploits based on illegal control flow transfers identification.Both static and dynamic analysis methods were performed to construct the CFSO (control flow safety outline),which was used to restrict the targets of c...
Saved in:
Main Authors: | Ming-hua WANG, Ling-yun YING, Deng-guo FENG |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2014-09-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.09.003/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Automatic exploitation generation method of write-what-where vulnerability
by: Huafeng HUANG, et al.
Published: (2022-01-01) -
Security capability analysis of software-based heterogeneous redundant execution system
by: Bolin MA, et al.
Published: (2021-09-01) -
Features of the interrogation tactics of a suspect in illegal fishing, hunting, or other aquatic resource exploitation
by: R. O. Stadnichenko
Published: (2024-09-01) -
A general attack model based on Android system vulnerability
by: Xihai DENG, et al.
Published: (2016-10-01) -
A general way to assign IPv6 trusted address under portal authentication
by: Jiang ZHOU, et al.
Published: (2019-12-01)