ROPocop — Dynamic mitigation of code-reuse attacks

Control-flow attacks, usually achieved by exploiting a buffer-overflow vulnerability, have been a serious threat to system security for over fifteen years. Researchers have answered the threat with various mitigation techniques; but nevertheless, new exploits that successfully bypass these technolog...

Full description

Saved in:
Bibliographic Details
Published in:Journal of information security and applications Vol. 29; pp. 16 - 26
Main Authors: Follner, Andreas, Bodden, Eric
Format: Journal Article
Language:English
Published: Elsevier Ltd 01.08.2016
Subjects:
ISSN:2214-2126
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first