Vulnerability exploitation and its mitigation technologies have always been important in vulnerability offense and defense research. Major operating systems and compilers provide support for exploit mitigation. This paper summarizes research on heap protection, address randomization, sandbox protection and other related technologies which have been developed. Among them, the three rounds of combat for GS and SafeSEH for stack protection focus on both offensive and defensive strategies. ROP, DeActive, Spray breakthroughs and counterattacking are analyzed to illustrate the evolution of data execution prevention. The truncation attack vector is used to monitor data integration destruction, undermine reliable exploitation, prevent control flow ...
One of the most prevalent, ancient and devastating vulnerabilities which is increasing rapidly is Me...
Memory vulnerabilities and bugs become one of the most severe problem in today's system security.Due...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
The chapter introduces and describes representative defense mechanisms to protect from both basic an...
Software vulnerabilities widely exist among various software from operating system kernel to web bro...
Exploitation of memory-corruption vulnerabilities in widely-used software has been a threat for over...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
Exploits of vulnerabilities due to low-level coding defects such as buffer overruns and integer over...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
DDoS attacks are becoming more common and sophisticated. Only recently, in 2017, Google claims they ...
Low-level exploitation is an ongoing security issue. History has shown multiple methods to gain cont...
Despite the broad diversity of attacks and the many different ways an adversary can exploit a system...
Memory corruption attacks on SCADA devices can cause significant dis- ruptions to control systems an...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
One of the most prevalent, ancient and devastating vulnerabilities which is increasing rapidly is Me...
One of the most prevalent, ancient and devastating vulnerabilities which is increasing rapidly is Me...
Memory vulnerabilities and bugs become one of the most severe problem in today's system security.Due...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
The chapter introduces and describes representative defense mechanisms to protect from both basic an...
Software vulnerabilities widely exist among various software from operating system kernel to web bro...
Exploitation of memory-corruption vulnerabilities in widely-used software has been a threat for over...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
Exploits of vulnerabilities due to low-level coding defects such as buffer overruns and integer over...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
DDoS attacks are becoming more common and sophisticated. Only recently, in 2017, Google claims they ...
Low-level exploitation is an ongoing security issue. History has shown multiple methods to gain cont...
Despite the broad diversity of attacks and the many different ways an adversary can exploit a system...
Memory corruption attacks on SCADA devices can cause significant dis- ruptions to control systems an...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
One of the most prevalent, ancient and devastating vulnerabilities which is increasing rapidly is Me...
One of the most prevalent, ancient and devastating vulnerabilities which is increasing rapidly is Me...
Memory vulnerabilities and bugs become one of the most severe problem in today's system security.Due...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...