control-flow hijacking

2. Control Hijacking Attacks

Overview of control-flow hijacking attack and defense techniques for process

Bypassing Linux kernel protections when hijacking control flow

15 Buffer Overflow and Control Flow Hijacking

How to Survive the Hardware Assisted Control-Flow Integrity Enforcement

USENIX Security '19 - KEPLER: Facilitating Control-flow Hijacking Primitive Evaluation for Linux

Running a Buffer Overflow Attack - Computerphile

Exploiting Adobe Flash Player In The Era Of Control Flow Guard

Control Hijacking

Buffer Overflow

Towards a Policy-Agnostic Control-Flow Integrity Implementation

Buffer Overflow Hacking Tutorial (Bypass Passwords)

Capturing 0Day Exploits With Perfectly Placed Hardware Traps

Cryptographic Enforced Control Flow Integrity

SoK: Shining Light on Shadow Stacks

Lost Control-Breaking Hardware-Assisted Kernel Control-Flow Integrity with Page-Oriented Programming

NDSS 2018 Back To The Epilogue: Evading Control Flow Guard via Unaligned Targets

USENIX Security '19 - Origin-sensitive Control Flow Integrity

Drop the ROP: Fine-Grained Control-Flow Integrity for the Linux Kernel

Enforcing Unique Code Target Property for Control-Flow Integrity

Hijacking Transient Execution through Microarchitectural Load Value Injection.

Sept 17 Heap overflow, Heartbleed, control/data flow hijacking, prevention by Danfeng (Daphne) Yao

Control Flow Integrity in the Linux Kernel - Kees Cook, Google

CERIAS Symposium 2017 - Prof. Mathias Payer

welcome to shbcf.ru