New approach to return-oriented programming exploitation mitigation.

Information Security Journal: A Global Perspective(2017)

引用 0|浏览9
暂无评分
摘要
Preventing software exploitation is an incredibly important goal for cyber security professionals, and huge amounts of time, effort, and money are devoted to this cause worldwide. A key stage of the exploitation process is gaining control of the execution flow of a target process so as to redirect it to the attacker’s illicit shellcode; most of the exploit mitigations currently in use are targeted at increasing the difficulty of this act. This article presents a new method for preventing control flow hijacking that provides a more robust defensive posture than existing options and is achieved by dereferencing function and return pointers to evaluate their contents rather than the extant approach of evaluating the pointers themselves.
更多
查看译文
关键词
Evaluation, intrusion detection, telecommunications and network security, testing
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要