Strict Virtual Call Integrity Checking for C++ Binaries

AsiaCCS, pp. 140-154, 2017.

Cited by: 16|Views15
EI

Abstract:

Modern operating systems are equipped with defenses that render legacy code injection attacks inoperable. However, attackers can bypass these defenses by crafting attacks that reuse existing code in a program's memory. One of the most common classes of attacks manipulates memory data used indirectly to execute code, such as function point...More

Code:

Data:

Your rating :
0

 

Tags
Comments