CFI Approach to Defend against GOT Overwrite Attacks
Seunghoon Jeong, Jaejoon Hwang, Hyukjin Kwon, Dongkyoo Shin, Journal of Internet Computing and Services, Vol. 21, No. 1, pp. 179-190, Feb. 2020
10.7472/jksii.2020.21.1.179, Full Text:
Keywords: Control Flow Integrity, GOT/PLT, linking and loading, Security
Abstract
Statistics
Show / Hide Statistics
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[APA Style]
Jeong, S., Hwang, J., Kwon, H., & Shin, D. (2020). CFI Approach to Defend against GOT Overwrite Attacks. Journal of Internet Computing and Services, 21(1), 179-190. DOI: 10.7472/jksii.2020.21.1.179.
[IEEE Style]
S. Jeong, J. Hwang, H. Kwon, D. Shin, "CFI Approach to Defend against GOT Overwrite Attacks," Journal of Internet Computing and Services, vol. 21, no. 1, pp. 179-190, 2020. DOI: 10.7472/jksii.2020.21.1.179.
[ACM Style]
Seunghoon Jeong, Jaejoon Hwang, Hyukjin Kwon, and Dongkyoo Shin. 2020. CFI Approach to Defend against GOT Overwrite Attacks. Journal of Internet Computing and Services, 21, 1, (2020), 179-190. DOI: 10.7472/jksii.2020.21.1.179.