利用
控制流程
计算机科学
计算机安全
软件错误
编码(集合论)
影子(心理学)
软件
控制(管理)
操作系统
程序设计语言
心理学
人工智能
集合(抽象数据类型)
心理治疗师
标识
DOI:10.1145/3474370.3485657
摘要
For nearly two decades now, the vast majority of critical software vulnerabilities have been memory corruption bugs in C and C++ programs[13, 14]. Attackers often exploit these bugs using control-flow hijacking techniques to seize control over vulnerable programs. This allows them to execute arbitrary code, exfiltrate sensitive data, or escalate the programs' privileges. However, thanks to the successful rollout of mitigations such as control-flow integrity and shadow stacks,[5] it is becoming increasingly harder to mount control-flow attacks.
科研通智能强力驱动
Strongly Powered by AbleSci AI