Strict Virtual Call Integrity Checking for C++ Binaries
AsiaCCS, pp. 140-154, 2017.
EI
Abstract:
Modern operating systems are equipped with defenses that render legacy code injection attacks inoperable. However, attackers can bypass these defenses by crafting attacks that reuse existing code in a program's memory. One of the most common classes of attacks manipulates memory data used indirectly to execute code, such as function point...More
Code:
Data:
Tags
Comments