Building Secure Defenses Against Code-Reuse AttacksDiscussion and Conclusion
Building Secure Defenses Against Code-Reuse Attacks: Discussion and Conclusion
Davi, Lucas; Sadeghi, Ahmad-Reza
2015-12-08 00:00:00
[Modern runtime exploits perform malicious program actions based on the principle of code-reuse. These attacks require no code injection, bypass widely deployed defense mechanisms, allow Turing-complete computation, can be applied to many processor architectures, and are highly challenging to prevent.]
http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.pnghttp://www.deepdyve.com/lp/springer-journals/building-secure-defenses-against-code-reuse-attacks-discussion-and-PhXvLcEabg
Building Secure Defenses Against Code-Reuse AttacksDiscussion and Conclusion
[Modern runtime exploits perform malicious program actions based on the principle of code-reuse. These attacks require no code injection, bypass widely deployed defense mechanisms, allow Turing-complete computation, can be applied to many processor architectures, and are highly challenging to prevent.]
Published: Dec 8, 2015
Recommended Articles
Loading...
There are no references for this article.
Share the Full Text of this Article with up to 5 Colleagues for FREE
Sign up for your 14-Day Free Trial Now!
Read and print from thousands of top scholarly journals.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.