Context: Diversification and obfuscation are promising techniques for securing software and protecting computers from harmful malware. The goal of these techniques is not removing …
Modern operating systems use hardware support to protect against control-flow hijacking attacks such as code-injection attacks. Typically, write access to executable pages is …
While code injection attacks have been virtually eliminated on modern systems, programs today remain vulnerable to code reuse attacks. Particularly pernicious are Just-In-Time ROP …
P Bhat, K Dutta - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
The advent of the Android system has brought smartphone technology to the doorsteps of the masses. The latest technologies have made it affordable for every section of the society …
Despite decades of research on software diversification, only address space layout randomization has seen widespread adoption. Code randomization, an effective defense …
Attacks often succeed by abusing the gap between program and machine-level semantics-- for example, by locating a sensitive pointer, exploiting a bug to overwrite this sensitive data …
X Chen, H Bos, C Giuffrida - 2017 IEEE European Symposium …, 2017 - ieeexplore.ieee.org
Code diversification is an effective strategy to prevent modern code-reuse exploits. Unfortunately, diversification techniques are inherently vulnerable to information disclosure …
As an increasing number of deep-learning-based malware scanners have been proposed, the existing evasion techniques, including code obfuscation and polymorphic malware, are …
Z Zhang, H Li, H Chang, Z Pan, X Luo - Journal of CO2 Utilization, 2018 - Elsevier
CO 2 is the major greenhouse gas (GHG) emission throughout the world. For scientific and industrial purposes, chemical absorption is regarded as an efficient method to capture CO 2 …