JITDefender: A defense against JIT spraying attacks

被引:0
|
作者
Chen, Ping [1 ,2 ]
Fang, Yi [1 ,2 ]
Mao, Bing [1 ,2 ]
Xie, Li [1 ,2 ]
机构
[1] State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210093, China
[2] Department of Computer Science and Technology, Nanjing University, Nanjing 210093, China
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Network security
引用
收藏
页码:142 / 153
相关论文
共 50 条
  • [21] Smart Home Defense Against DDoS Attacks
    Huraj, Ladislav
    Simon, Marek
    Lietava, Jakub
    DATA SCIENCE AND ALGORITHMS IN SYSTEMS, 2022, VOL 2, 2023, 597 : 334 - 345
  • [22] A Transparent Defense Against USB Eavesdropping Attacks
    Neugschwandtner, Matthias
    Beitler, Anton
    Kurmus, Anil
    PROCEEDINGS OF THE 9TH EUROPEAN WORKSHOP ON SYSTEM SECURITY, (EUROSEC 2016), 2016, : 31 - 36
  • [23] Defense Against Adversarial Attacks by Reconstructing Images
    Zhang, Shudong
    Gao, Haichang
    Rao, Qingxun
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2021, 30 : 6117 - 6129
  • [24] An Overview of Defense Techniques Against DoS Attacks
    Afzaal, Muhammad
    2022 9TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY, IOTSMS, 2022, : 101 - 108
  • [25] LOBOTOMY An Architecture for JIT Spraying Mitigation
    Jauernig, Martin
    Neugschwandtner, Matthias
    Platzer, Christian
    Comparetti, Paolo Milani
    2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 50 - 58
  • [26] Action-Manipulation Attacks Against Stochastic Bandits: Attacks and Defense
    Liu, Guanlin
    Lai, Lifeng
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2020, 68 (68) : 5152 - 5165
  • [27] Defense-VAE: A Fast and Accurate Defense Against Adversarial Attacks
    Li, Xiang
    Ji, Shihao
    MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES, ECML PKDD 2019, PT II, 2020, 1168 : 191 - 207
  • [28] JITSafe: a framework against Just-in-time spraying attacks
    Chen, Ping
    Wu, Rui
    Mao, Bing
    IET INFORMATION SECURITY, 2013, 7 (04) : 283 - 292
  • [29] A processor architecture Defense against buffer overflow attacks
    McGregor, JP
    Karig, DK
    Shi, ZJ
    Lee, RB
    ITRE2003: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: RESEARCH AND EDUCATION, 2003, : 243 - 250
  • [30] Defense against bandwidth attacks with traffic resource management
    Luo, Hongli
    Shyu, Mei-Ling
    IRI 2007: PROCEEDINGS OF THE 2007 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION, 2007, : 190 - +