Overview of control-flow hijacking attack and defense techniques for process
Control flow hijacking attack is a common attack against computer software, which brings great harm to computer software security and is a research hotspot in the field of information security. Firstly, from the perspective of the source of attack code, the related research was expounded on process’...
Ausführliche Beschreibung
Autor*in: |
WANG Fengfeng, ZHANG Tao, XU Weiguang, SUN Meng [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch ; Chinesisch |
Erschienen: |
2019 |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
In: 网络与信息安全学报 - POSTS&TELECOM PRESS Co., LTD, 2022, 5(2019), 6, Seite 10-20 |
---|---|
Übergeordnetes Werk: |
volume:5 ; year:2019 ; number:6 ; pages:10-20 |
Links: |
---|
DOI / URN: |
10.11959/j.issn.2096-109x.2019058 |
---|
Katalog-ID: |
DOAJ076829812 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | DOAJ076829812 | ||
003 | DE-627 | ||
005 | 20230309145058.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230228s2019 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.11959/j.issn.2096-109x.2019058 |2 doi | |
035 | |a (DE-627)DOAJ076829812 | ||
035 | |a (DE-599)DOAJ4dc3d5f1ab1345fbaf19183fc9eaaf2d | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng |a chi | ||
050 | 0 | |a QA75.5-76.95 | |
100 | 0 | |a WANG Fengfeng, ZHANG Tao, XU Weiguang, SUN Meng |e verfasserin |4 aut | |
245 | 1 | 0 | |a Overview of control-flow hijacking attack and defense techniques for process |
264 | 1 | |c 2019 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Control flow hijacking attack is a common attack against computer software, which brings great harm to computer software security and is a research hotspot in the field of information security. Firstly, from the perspective of the source of attack code, the related research was expounded on process’s control flow hijacking attack. Secondly, according to the newest development status of control flow hijacking attack technology, the related defense technologies at home and abroad were introduced based on different defense ideas. Finally, the development trend of control flow hijacking offensive and defensive technology were summarized. | ||
650 | 4 | |a software security | |
650 | 4 | |a control flow hijacking attacks | |
650 | 4 | |a control flow integrity | |
650 | 4 | |a randomization | |
653 | 0 | |a Electronic computers. Computer science | |
773 | 0 | 8 | |i In |t 网络与信息安全学报 |d POSTS&TELECOM PRESS Co., LTD, 2022 |g 5(2019), 6, Seite 10-20 |w (DE-627)DOAJ078621860 |x 2096109X |7 nnns |
773 | 1 | 8 | |g volume:5 |g year:2019 |g number:6 |g pages:10-20 |
856 | 4 | 0 | |u https://doi.org/10.11959/j.issn.2096-109x.2019058 |z kostenfrei |
856 | 4 | 0 | |u https://doaj.org/article/4dc3d5f1ab1345fbaf19183fc9eaaf2d |z kostenfrei |
856 | 4 | 0 | |u http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2019058 |z kostenfrei |
856 | 4 | 2 | |u https://doaj.org/toc/2096-109X |y Journal toc |z kostenfrei |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_DOAJ | ||
951 | |a AR | ||
952 | |d 5 |j 2019 |e 6 |h 10-20 |
author_variant |
f z t x w s m w fztxwsm fztxwsmw |
---|---|
matchkey_str |
article:2096109X:2019----::vriwfotofohjcigtakndfnee |
hierarchy_sort_str |
2019 |
callnumber-subject-code |
QA |
publishDate |
2019 |
allfields |
10.11959/j.issn.2096-109x.2019058 doi (DE-627)DOAJ076829812 (DE-599)DOAJ4dc3d5f1ab1345fbaf19183fc9eaaf2d DE-627 ger DE-627 rakwb eng chi QA75.5-76.95 WANG Fengfeng, ZHANG Tao, XU Weiguang, SUN Meng verfasserin aut Overview of control-flow hijacking attack and defense techniques for process 2019 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Control flow hijacking attack is a common attack against computer software, which brings great harm to computer software security and is a research hotspot in the field of information security. Firstly, from the perspective of the source of attack code, the related research was expounded on process’s control flow hijacking attack. Secondly, according to the newest development status of control flow hijacking attack technology, the related defense technologies at home and abroad were introduced based on different defense ideas. Finally, the development trend of control flow hijacking offensive and defensive technology were summarized. software security control flow hijacking attacks control flow integrity randomization Electronic computers. Computer science In 网络与信息安全学报 POSTS&TELECOM PRESS Co., LTD, 2022 5(2019), 6, Seite 10-20 (DE-627)DOAJ078621860 2096109X nnns volume:5 year:2019 number:6 pages:10-20 https://doi.org/10.11959/j.issn.2096-109x.2019058 kostenfrei https://doaj.org/article/4dc3d5f1ab1345fbaf19183fc9eaaf2d kostenfrei http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2019058 kostenfrei https://doaj.org/toc/2096-109X Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ AR 5 2019 6 10-20 |
spelling |
10.11959/j.issn.2096-109x.2019058 doi (DE-627)DOAJ076829812 (DE-599)DOAJ4dc3d5f1ab1345fbaf19183fc9eaaf2d DE-627 ger DE-627 rakwb eng chi QA75.5-76.95 WANG Fengfeng, ZHANG Tao, XU Weiguang, SUN Meng verfasserin aut Overview of control-flow hijacking attack and defense techniques for process 2019 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Control flow hijacking attack is a common attack against computer software, which brings great harm to computer software security and is a research hotspot in the field of information security. Firstly, from the perspective of the source of attack code, the related research was expounded on process’s control flow hijacking attack. Secondly, according to the newest development status of control flow hijacking attack technology, the related defense technologies at home and abroad were introduced based on different defense ideas. Finally, the development trend of control flow hijacking offensive and defensive technology were summarized. software security control flow hijacking attacks control flow integrity randomization Electronic computers. Computer science In 网络与信息安全学报 POSTS&TELECOM PRESS Co., LTD, 2022 5(2019), 6, Seite 10-20 (DE-627)DOAJ078621860 2096109X nnns volume:5 year:2019 number:6 pages:10-20 https://doi.org/10.11959/j.issn.2096-109x.2019058 kostenfrei https://doaj.org/article/4dc3d5f1ab1345fbaf19183fc9eaaf2d kostenfrei http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2019058 kostenfrei https://doaj.org/toc/2096-109X Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ AR 5 2019 6 10-20 |
allfields_unstemmed |
10.11959/j.issn.2096-109x.2019058 doi (DE-627)DOAJ076829812 (DE-599)DOAJ4dc3d5f1ab1345fbaf19183fc9eaaf2d DE-627 ger DE-627 rakwb eng chi QA75.5-76.95 WANG Fengfeng, ZHANG Tao, XU Weiguang, SUN Meng verfasserin aut Overview of control-flow hijacking attack and defense techniques for process 2019 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Control flow hijacking attack is a common attack against computer software, which brings great harm to computer software security and is a research hotspot in the field of information security. Firstly, from the perspective of the source of attack code, the related research was expounded on process’s control flow hijacking attack. Secondly, according to the newest development status of control flow hijacking attack technology, the related defense technologies at home and abroad were introduced based on different defense ideas. Finally, the development trend of control flow hijacking offensive and defensive technology were summarized. software security control flow hijacking attacks control flow integrity randomization Electronic computers. Computer science In 网络与信息安全学报 POSTS&TELECOM PRESS Co., LTD, 2022 5(2019), 6, Seite 10-20 (DE-627)DOAJ078621860 2096109X nnns volume:5 year:2019 number:6 pages:10-20 https://doi.org/10.11959/j.issn.2096-109x.2019058 kostenfrei https://doaj.org/article/4dc3d5f1ab1345fbaf19183fc9eaaf2d kostenfrei http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2019058 kostenfrei https://doaj.org/toc/2096-109X Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ AR 5 2019 6 10-20 |
allfieldsGer |
10.11959/j.issn.2096-109x.2019058 doi (DE-627)DOAJ076829812 (DE-599)DOAJ4dc3d5f1ab1345fbaf19183fc9eaaf2d DE-627 ger DE-627 rakwb eng chi QA75.5-76.95 WANG Fengfeng, ZHANG Tao, XU Weiguang, SUN Meng verfasserin aut Overview of control-flow hijacking attack and defense techniques for process 2019 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Control flow hijacking attack is a common attack against computer software, which brings great harm to computer software security and is a research hotspot in the field of information security. Firstly, from the perspective of the source of attack code, the related research was expounded on process’s control flow hijacking attack. Secondly, according to the newest development status of control flow hijacking attack technology, the related defense technologies at home and abroad were introduced based on different defense ideas. Finally, the development trend of control flow hijacking offensive and defensive technology were summarized. software security control flow hijacking attacks control flow integrity randomization Electronic computers. Computer science In 网络与信息安全学报 POSTS&TELECOM PRESS Co., LTD, 2022 5(2019), 6, Seite 10-20 (DE-627)DOAJ078621860 2096109X nnns volume:5 year:2019 number:6 pages:10-20 https://doi.org/10.11959/j.issn.2096-109x.2019058 kostenfrei https://doaj.org/article/4dc3d5f1ab1345fbaf19183fc9eaaf2d kostenfrei http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2019058 kostenfrei https://doaj.org/toc/2096-109X Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ AR 5 2019 6 10-20 |
allfieldsSound |
10.11959/j.issn.2096-109x.2019058 doi (DE-627)DOAJ076829812 (DE-599)DOAJ4dc3d5f1ab1345fbaf19183fc9eaaf2d DE-627 ger DE-627 rakwb eng chi QA75.5-76.95 WANG Fengfeng, ZHANG Tao, XU Weiguang, SUN Meng verfasserin aut Overview of control-flow hijacking attack and defense techniques for process 2019 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Control flow hijacking attack is a common attack against computer software, which brings great harm to computer software security and is a research hotspot in the field of information security. Firstly, from the perspective of the source of attack code, the related research was expounded on process’s control flow hijacking attack. Secondly, according to the newest development status of control flow hijacking attack technology, the related defense technologies at home and abroad were introduced based on different defense ideas. Finally, the development trend of control flow hijacking offensive and defensive technology were summarized. software security control flow hijacking attacks control flow integrity randomization Electronic computers. Computer science In 网络与信息安全学报 POSTS&TELECOM PRESS Co., LTD, 2022 5(2019), 6, Seite 10-20 (DE-627)DOAJ078621860 2096109X nnns volume:5 year:2019 number:6 pages:10-20 https://doi.org/10.11959/j.issn.2096-109x.2019058 kostenfrei https://doaj.org/article/4dc3d5f1ab1345fbaf19183fc9eaaf2d kostenfrei http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2019058 kostenfrei https://doaj.org/toc/2096-109X Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ AR 5 2019 6 10-20 |
language |
English Chinese |
source |
In 网络与信息安全学报 5(2019), 6, Seite 10-20 volume:5 year:2019 number:6 pages:10-20 |
sourceStr |
In 网络与信息安全学报 5(2019), 6, Seite 10-20 volume:5 year:2019 number:6 pages:10-20 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
software security control flow hijacking attacks control flow integrity randomization Electronic computers. Computer science |
isfreeaccess_bool |
true |
container_title |
网络与信息安全学报 |
authorswithroles_txt_mv |
WANG Fengfeng, ZHANG Tao, XU Weiguang, SUN Meng @@aut@@ |
publishDateDaySort_date |
2019-01-01T00:00:00Z |
hierarchy_top_id |
DOAJ078621860 |
id |
DOAJ076829812 |
language_de |
englisch chinesisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ076829812</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230309145058.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230228s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.11959/j.issn.2096-109x.2019058</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ076829812</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJ4dc3d5f1ab1345fbaf19183fc9eaaf2d</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield><subfield code="a">chi</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA75.5-76.95</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">WANG Fengfeng, ZHANG Tao, XU Weiguang, SUN Meng</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Overview of control-flow hijacking attack and defense techniques for process</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2019</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Control flow hijacking attack is a common attack against computer software, which brings great harm to computer software security and is a research hotspot in the field of information security. Firstly, from the perspective of the source of attack code, the related research was expounded on process’s control flow hijacking attack. Secondly, according to the newest development status of control flow hijacking attack technology, the related defense technologies at home and abroad were introduced based on different defense ideas. Finally, the development trend of control flow hijacking offensive and defensive technology were summarized.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">software security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">control flow hijacking attacks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">control flow integrity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">randomization</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Electronic computers. Computer science</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">网络与信息安全学报</subfield><subfield code="d">POSTS&TELECOM PRESS Co., LTD, 2022</subfield><subfield code="g">5(2019), 6, Seite 10-20</subfield><subfield code="w">(DE-627)DOAJ078621860</subfield><subfield code="x">2096109X</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:5</subfield><subfield code="g">year:2019</subfield><subfield code="g">number:6</subfield><subfield code="g">pages:10-20</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.11959/j.issn.2096-109x.2019058</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/4dc3d5f1ab1345fbaf19183fc9eaaf2d</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2019058</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/2096-109X</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">5</subfield><subfield code="j">2019</subfield><subfield code="e">6</subfield><subfield code="h">10-20</subfield></datafield></record></collection>
|
callnumber-first |
Q - Science |
author |
WANG Fengfeng, ZHANG Tao, XU Weiguang, SUN Meng |
spellingShingle |
WANG Fengfeng, ZHANG Tao, XU Weiguang, SUN Meng misc QA75.5-76.95 misc software security misc control flow hijacking attacks misc control flow integrity misc randomization misc Electronic computers. Computer science Overview of control-flow hijacking attack and defense techniques for process |
authorStr |
WANG Fengfeng, ZHANG Tao, XU Weiguang, SUN Meng |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)DOAJ078621860 |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut |
collection |
DOAJ |
remote_str |
true |
callnumber-label |
QA75 |
illustrated |
Not Illustrated |
issn |
2096109X |
topic_title |
QA75.5-76.95 Overview of control-flow hijacking attack and defense techniques for process software security control flow hijacking attacks control flow integrity randomization |
topic |
misc QA75.5-76.95 misc software security misc control flow hijacking attacks misc control flow integrity misc randomization misc Electronic computers. Computer science |
topic_unstemmed |
misc QA75.5-76.95 misc software security misc control flow hijacking attacks misc control flow integrity misc randomization misc Electronic computers. Computer science |
topic_browse |
misc QA75.5-76.95 misc software security misc control flow hijacking attacks misc control flow integrity misc randomization misc Electronic computers. Computer science |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
网络与信息安全学报 |
hierarchy_parent_id |
DOAJ078621860 |
hierarchy_top_title |
网络与信息安全学报 |
isfreeaccess_txt |
true |
familylinks_str_mv |
(DE-627)DOAJ078621860 |
title |
Overview of control-flow hijacking attack and defense techniques for process |
ctrlnum |
(DE-627)DOAJ076829812 (DE-599)DOAJ4dc3d5f1ab1345fbaf19183fc9eaaf2d |
title_full |
Overview of control-flow hijacking attack and defense techniques for process |
author_sort |
WANG Fengfeng, ZHANG Tao, XU Weiguang, SUN Meng |
journal |
网络与信息安全学报 |
journalStr |
网络与信息安全学报 |
callnumber-first-code |
Q |
lang_code |
eng chi |
isOA_bool |
true |
recordtype |
marc |
publishDateSort |
2019 |
contenttype_str_mv |
txt |
container_start_page |
10 |
author_browse |
WANG Fengfeng, ZHANG Tao, XU Weiguang, SUN Meng |
container_volume |
5 |
class |
QA75.5-76.95 |
format_se |
Elektronische Aufsätze |
author-letter |
WANG Fengfeng, ZHANG Tao, XU Weiguang, SUN Meng |
doi_str_mv |
10.11959/j.issn.2096-109x.2019058 |
title_sort |
overview of control-flow hijacking attack and defense techniques for process |
callnumber |
QA75.5-76.95 |
title_auth |
Overview of control-flow hijacking attack and defense techniques for process |
abstract |
Control flow hijacking attack is a common attack against computer software, which brings great harm to computer software security and is a research hotspot in the field of information security. Firstly, from the perspective of the source of attack code, the related research was expounded on process’s control flow hijacking attack. Secondly, according to the newest development status of control flow hijacking attack technology, the related defense technologies at home and abroad were introduced based on different defense ideas. Finally, the development trend of control flow hijacking offensive and defensive technology were summarized. |
abstractGer |
Control flow hijacking attack is a common attack against computer software, which brings great harm to computer software security and is a research hotspot in the field of information security. Firstly, from the perspective of the source of attack code, the related research was expounded on process’s control flow hijacking attack. Secondly, according to the newest development status of control flow hijacking attack technology, the related defense technologies at home and abroad were introduced based on different defense ideas. Finally, the development trend of control flow hijacking offensive and defensive technology were summarized. |
abstract_unstemmed |
Control flow hijacking attack is a common attack against computer software, which brings great harm to computer software security and is a research hotspot in the field of information security. Firstly, from the perspective of the source of attack code, the related research was expounded on process’s control flow hijacking attack. Secondly, according to the newest development status of control flow hijacking attack technology, the related defense technologies at home and abroad were introduced based on different defense ideas. Finally, the development trend of control flow hijacking offensive and defensive technology were summarized. |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ |
container_issue |
6 |
title_short |
Overview of control-flow hijacking attack and defense techniques for process |
url |
https://doi.org/10.11959/j.issn.2096-109x.2019058 https://doaj.org/article/4dc3d5f1ab1345fbaf19183fc9eaaf2d http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2019058 https://doaj.org/toc/2096-109X |
remote_bool |
true |
ppnlink |
DOAJ078621860 |
callnumber-subject |
QA - Mathematics |
mediatype_str_mv |
c |
isOA_txt |
true |
hochschulschrift_bool |
false |
doi_str |
10.11959/j.issn.2096-109x.2019058 |
callnumber-a |
QA75.5-76.95 |
up_date |
2024-07-03T22:37:41.976Z |
_version_ |
1803599229218717697 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ076829812</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230309145058.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230228s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.11959/j.issn.2096-109x.2019058</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ076829812</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJ4dc3d5f1ab1345fbaf19183fc9eaaf2d</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield><subfield code="a">chi</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA75.5-76.95</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">WANG Fengfeng, ZHANG Tao, XU Weiguang, SUN Meng</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Overview of control-flow hijacking attack and defense techniques for process</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2019</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Control flow hijacking attack is a common attack against computer software, which brings great harm to computer software security and is a research hotspot in the field of information security. Firstly, from the perspective of the source of attack code, the related research was expounded on process’s control flow hijacking attack. Secondly, according to the newest development status of control flow hijacking attack technology, the related defense technologies at home and abroad were introduced based on different defense ideas. Finally, the development trend of control flow hijacking offensive and defensive technology were summarized.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">software security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">control flow hijacking attacks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">control flow integrity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">randomization</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Electronic computers. Computer science</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">网络与信息安全学报</subfield><subfield code="d">POSTS&TELECOM PRESS Co., LTD, 2022</subfield><subfield code="g">5(2019), 6, Seite 10-20</subfield><subfield code="w">(DE-627)DOAJ078621860</subfield><subfield code="x">2096109X</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:5</subfield><subfield code="g">year:2019</subfield><subfield code="g">number:6</subfield><subfield code="g">pages:10-20</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.11959/j.issn.2096-109x.2019058</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/4dc3d5f1ab1345fbaf19183fc9eaaf2d</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2019058</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/2096-109X</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">5</subfield><subfield code="j">2019</subfield><subfield code="e">6</subfield><subfield code="h">10-20</subfield></datafield></record></collection>
|
score |
7.40149 |