Chinese Journal of Network and Information Security ›› 2019, Vol. 5 ›› Issue (6): 10-20.doi: 10.11959/j.issn.2096-109x.2019058

• Comprehensive Review • Previous Articles     Next Articles

Overview of control-flow hijacking attack and defense techniques for process

Fengfeng WANG(),Tao ZHANG,Weiguang XU,Meng SUN   

  1. Army Engineering University,Nanjing 210001,China
  • Revised:2019-03-19 Online:2019-12-15 Published:2019-12-14
  • Supported by:
    The Natural Science Foundation of Jiangsu Province for Excellent Yong Scholars(BK20180080)

Abstract:

Control flow hijacking attack is a common attack against computer software,which brings great harm to computer software security and is a research hotspot in the field of information security.Firstly,from the perspective of the source of attack code,the related research was expounded on process’s control flow hijacking attack.Secondly,according to the newest development status of control flow hijacking attack technology,the related defense technologies at home and abroad were introduced based on different defense ideas.Finally,the development trend of control flow hijacking offensive and defensive technology were summarized.

Key words: software security, control flow hijacking attacks, control flow integrity, randomization

CLC Number: 

No Suggested Reading articles found!