A Survey of Prevention/Mitigation against Memory Corruption Attacks.
Takamichi SaitoRyohei WatanabeShuta KondoShota SugawaraMasahiro YokoyamaPublished in: NBiS (2016)
Keyphrases
- data corruption
- denial of service
- dos attacks
- buffer overflow
- main memory
- memory requirements
- countermeasures
- virtual memory
- memory size
- limited memory
- attack detection
- malicious attacks
- memory usage
- watermarking scheme
- chosen plaintext
- malicious users
- detect malicious
- data sets
- terrorist attacks
- traffic analysis
- watermarking algorithm
- risk management
- intrusion detection