Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads.
Adrian TangSimha SethumadhavanSalvatore J. StolfoPublished in: CCS (2015)
Keyphrases
- malicious code
- data publishing
- source code
- memory requirements
- data corruption
- memory space
- security mechanisms
- operating system
- information loss
- windows xp
- countermeasures
- memory usage
- traffic analysis
- privacy preserving data publishing
- processor core
- malicious users
- memory size
- limited memory
- static analysis
- privacy issues
- security risks
- ddos attacks
- private information
- statistical databases
- neural network