首页> 外文期刊>ACM Computing Surveys >Runtime Countermeasures for Code Injection Attacks Against C and C++ Programs
【24h】

Runtime Countermeasures for Code Injection Attacks Against C and C++ Programs

机译:针对C和C ++程序的代码注入攻击的运行时对策

获取原文
获取原文并翻译 | 示例

摘要

The lack of memory safety in C/C++ often leads to vulnerabilities. Code injection attacks exploit these vulnerabilities to gain control over the execution flow of applications. These attacks have played a key role in many major security incidents. Consequently, a huge body of research on countermeasures exists. We provide a comprehensive and structured survey of vulnerabilities and countermeasures that operate at runtime. These countermeasures make different trade-offs in terms of performance, effectivity, compatibility, etc., making it hard to evaluate and compare countermeasures in a given context. We define a classification and evaluation framework on the basis of which countermeasures can be assessed.
机译:C / C ++中缺乏内存安全性通常会导致漏洞。代码注入攻击利用这些漏洞来控制应用程序的执行流程。这些攻击在许多重大安全事件中都发挥了关键作用。因此,存在大量的对策研究。我们提供了对运行时运行的漏洞和对策的全面结构化调查。这些对策在性能,有效性,兼容性等方面做出了不同的权衡,使得在给定背景下难以评估和比较对策。我们定义一个分类和评估框架,在此基础上可以评估对策。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号