Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Building Secure Defenses Against Code-Reuse AttacksDiscussion and Conclusion

Building Secure Defenses Against Code-Reuse Attacks: Discussion and Conclusion [Modern runtime exploits perform malicious program actions based on the principle of code-reuse. These attacks require no code injection, bypass widely deployed defense mechanisms, allow Turing-complete computation, can be applied to many processor architectures, and are highly challenging to prevent.] http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

Building Secure Defenses Against Code-Reuse AttacksDiscussion and Conclusion

Loading next page...
 
/lp/springer-journals/building-secure-defenses-against-code-reuse-attacks-discussion-and-PhXvLcEabg
Publisher
Springer International Publishing
Copyright
© The Author(s) 2015
ISBN
978-3-319-25544-6
Pages
69 –74
DOI
10.1007/978-3-319-25546-0_5
Publisher site
See Chapter on Publisher Site

Abstract

[Modern runtime exploits perform malicious program actions based on the principle of code-reuse. These attacks require no code injection, bypass widely deployed defense mechanisms, allow Turing-complete computation, can be applied to many processor architectures, and are highly challenging to prevent.]

Published: Dec 8, 2015

There are no references for this article.