Exploit detection based on illegal control flow transfers identification

In order to deal with exploit attacks such as APT,an approach was proposed to detect exploits based on illegal control flow transfers identification.Both static and dynamic analysis methods were performed to construct the CFSO (control flow safety outline),which was used to restrict the targets of c...

Full description

Saved in:
Bibliographic Details
Main Authors: Ming-hua WANG, Ling-yun YING, Deng-guo FENG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2014-09-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.09.003/
Tags: Add Tag
No Tags, Be the first to tag this record!