Now showing items 1-2 of 2
Hacking Data-Flow for Turing-Complete Attacks
(Georgia Institute of Technology, 2018-02-23)
Control-flow hijacking attacks from memory errors become more and more difficult as targeted defense mechanisms gain wide deployment. As an alternative, non-control data attacks do not require diverting the application’s ...
New Perspectives on Control-Flow Hijacking Mitigation
(Georgia Institute of Technology, 2018-09-21)
Despite over 20 years of research, control-flow hijacking attacks remain the most significant threat to software security. Attackers exploit C/C++ lack of memory and type safety to corrupt code-pointers, thereby hijacking ...