Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks
As control-flow hijacking defenses gain adoption, it is important to understand the remaining capabilities of adversaries via memory exploits. Non-control data exploits are used to mount information leakage attacks or privilege escalation attacks program memory. Compared to control-flow hijacking at...
Saved in:
Published in: | 2016 IEEE Symposium on Security and Privacy (SP) pp. 969 - 986 |
---|---|
Main Authors: | , , , , , |
Format: | Conference Proceeding Journal Article |
Language: | English |
Published: |
IEEE
01-05-2016
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!