Program Control Hijacking Countermeasures

博士 === 國立中央大學 === 資訊工程學系 === 103 === The original control flow of a program is designed by developers, but the attackers may change the control flow via the vulnerabilities in the program. So, the control flow is redirected to the code which the attackers intend to execute, called “abnormal control...

Full description

Bibliographic Details
Main Authors: Li-Han Chen, 陳立函
Other Authors: Fu-Hau Hsu
Format: Others
Language:en_US
Published: 2015
Online Access:http://ndltd.ncl.edu.tw/handle/9k8535