Program Anomaly Detection Against Data-Oriented Attacks

Memory-corruption vulnerability is one of the most common attack vectors used to compromise computer systems. Such vulnerabilities could lead to serious security problems and would remain an unsolved problem for a long time. Existing memory corruption attacks can be broadly classified into two categ...

Full description

Bibliographic Details
Main Author: Cheng, Long
Other Authors: Computer Science
Format: Others
Published: Virginia Tech 2018
Subjects:
Online Access:http://hdl.handle.net/10919/84937