Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches

نویسندگان

چکیده

Data-oriented attacks manipulate non-control data to alter a program’s benign behavior without violating its control-flow integrity. It has been shown that such can cause significant damage even in the presence of defense mechanisms. However, these threats have not adequately addressed. In this survey article, we first map data-oriented exploits, including Data-Oriented Programming (DOP) and Block-Oriented (BOP) attacks, their assumptions/requirements attack capabilities. Then, compare known defenses against terms approach, detection capabilities, overhead, compatibility. is generally believed control flows may be useful for security. (especially DOP attacks) generate side effects on behaviors multiple dimensions (i.e., incompatible branch frequency anomalies). We also characterize anomalies caused by attacks. end, discuss challenges building deployable open research questions.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Network defense: Approaches, methods and techniques

To defend a network from intrusion is a generic problem of all time. It is important to develop a defense mechanism to secure the network from anomalous activities. This paper presents a comprehensive survey of methods and systems introduced by researchers in the past two decades to protect network resources from intrusion. A detailed pros and cons analysis of these methods and systems is also ...

متن کامل

Defense techniques for low-rate DoS attacks against application servers

1389-1286/$ see front matter 2010 Elsevier B.V doi:10.1016/j.comnet.2010.05.002 * Corresponding author. Tel.: +34 95824100 958240831. E-mail addresses: [email protected] (G. Maciá-Fe correo.ugr.es (R.A. Rodríguez-Gómez), [email protected] ( Low-rate denial of service (DoS) attacks have recently emerged as new strategies for denying networking services. Such attacks are capable of discovering vulnerabilit...

متن کامل

Study of Recent DDoS Attacks and Defense Evaluation Approaches

Distributed Denial of Service (DDoS) attacks is virulent, relatively new type of attacks on the availability of Internet services and resources. DDoS attackers infiltrate large number of computers by exploiting software vulnerabilities, to set up DDoS attack networks. DDoS attacks pose an immense threat to the Internet, therefore some defense systems are required to defend these attacks. In thi...

متن کامل

the clustering and classification data mining techniques in insurance fraud detection:the case of iranian car insurance

با توجه به گسترش روز افزون تقلب در حوزه بیمه به خصوص در بخش بیمه اتومبیل و تبعات منفی آن برای شرکت های بیمه، به کارگیری روش های مناسب و کارآمد به منظور شناسایی و کشف تقلب در این حوزه امری ضروری است. درک الگوی موجود در داده های مربوط به مطالبات گزارش شده گذشته می تواند در کشف واقعی یا غیرواقعی بودن ادعای خسارت، مفید باشد. یکی از متداول ترین و پرکاربردترین راه های کشف الگوی داده ها استفاده از ر...

Data Provenance: A Categorization of Existing Approaches

In many application areas like e-science and data-warehousing detailed information about the origin of data is required. This kind of information is often referred to as data provenance or data lineage. The provenance of a data item includes information about the processes and source data items that lead to its creation and current representation. The diversity of data representation models and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM transactions on privacy and security

سال: 2021

ISSN: ['2471-2574', '2471-2566']

DOI: https://doi.org/10.1145/3462699