Survey of software anomaly detection based on deception

Advanced persistent threats (APT) will use vulnerabilities to automatically load attack code and hide attack behavior, and exploits code reuse to bypass the non-executable stack & heap protection, which is an essential threat to network security.Traditional control flow integrity and address spa...

Full description

Saved in:
Bibliographic Details
Main Authors: Jianming FU, Chang LIU, Mengfei XIE, Chenke LUO
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2022-02-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022003
Tags: Add Tag
No Tags, Be the first to tag this record!