• Hacking Data-Flow for Turing-Complete Attacks 

      Hu, Hong (Georgia Institute of Technology, 2018-02-23)
      Control-flow hijacking attacks from memory errors become more and more difficult as targeted defense mechanisms gain wide deployment. As an alternative, non-control data attacks do not require diverting the application’s ...
    • New Perspectives on Control-Flow Hijacking Mitigation 

      Burow, Nathan (Georgia Institute of Technology, 2018-09-21)
      Despite over 20 years of research, control-flow hijacking attacks remain the most significant threat to software security. Attackers exploit C/C++ lack of memory and type safety to corrupt code-pointers, thereby hijacking ...
    • Space Wars: Exploiting Program (in)Variants for Software Security 

      Hu, Hong (Georgia Institute of Technology, 2020-01-31)
      The ever-increasing code base of modern software inevitably introduces vulnerabilities which enable attackers to construct sophisticated exploits and compromise our computer systems. Control-flow hijacking is the ...