Method for analysis of code-reuse attacks
Providing security for computer programs is one of the paramount tasks nowadays. Failures in operation of program software can lead to serious consequences and exploitation of vulnerabilities can inflict immense harm. Large corporations pay particular attention to the analysis of computer security i...
Main Authors: | A. V. Vishnyakov, A. R. Nurmukhametov, Sh. F. Kurmangaleev, S. S. Gaisaryan |
---|---|
Format: | Article |
Language: | English |
Published: |
Ivannikov Institute for System Programming of the Russian Academy of Sciences
2018-12-01
|
Series: | Труды Института системного программирования РАН |
Subjects: | |
Online Access: | https://ispranproceedings.elpub.ru/jour/article/view/1103 |
Similar Items
-
Compiler protection techniques against software vulnerabilities exploitation
by: A. R. Nurmukhametov, et al.
Published: (2018-10-01) -
Classification of ROP gadgets
by: A. V. Vishnyakov
Published: (2018-10-01) -
Software defect severity estimation in presence of modern defense mechanisms
by: A. N. Fedotov, et al.
Published: (2018-10-01) -
MONITORING OF INFORMATION SECURITY EVENTS in technogenic objectS
by: D. S. Smoliak, et al.
Published: (2019-06-01) -
Search method for format string vulnerabilities
by: I. A. Vakhrushev, et al.
Published: (2018-10-01)