Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks

As control-flow hijacking defenses gain adoption, it is important to understand the remaining capabilities of adversaries via memory exploits. Non-control data exploits are used to mount information leakage attacks or privilege escalation attacks program memory. Compared to control-flow hijacking at...

Full description

Saved in:
Bibliographic Details
Published in:2016 IEEE Symposium on Security and Privacy (SP) pp. 969 - 986
Main Authors: Hong Hu, Shinde, Shweta, Adrian, Sendroiu, Zheng Leong Chua, Saxena, Prateek, Zhenkai Liang
Format: Conference Proceeding Journal Article
Language:English
Published: IEEE 01-05-2016
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first