Track Conventions, Not Attack Signatures: Fortifying X86 ABI and System Call Interfaces to Mitigate Code Reuse Attacks.
Sarp OzdemirRutvik SaptarshiAravind PrakashDmitry PonomarevPublished in: SEED (2021)
Keyphrases
- countermeasures
- malicious traffic
- malicious users
- malicious attacks
- attack detection
- code reuse
- differential power analysis
- denial of service attacks
- fault injection
- network traffic
- detection mechanism
- attack scenarios
- ddos attacks
- power analysis
- anti virus
- injection attacks
- cyber attacks
- data corruption
- network intrusion
- source code
- dos attacks
- security measures
- security risks
- normal traffic
- digital watermark
- software engineering
- block cipher
- phishing attacks
- intrusion detection
- network attacks
- information leakage
- information security
- computer security
- defense mechanisms
- detecting malicious
- security vulnerabilities
- alert correlation
- intrusion detection system
- software evolution
- distributed denial of service attacks
- security threats
- network security
- smart card
- anomaly detection
- relational databases
- normal behavior
- software development
- malicious nodes
- malware detection