Title :
A Survey on Protection Methodologies Against Control Flow Hijacking Attacks
Author :
Trikalinou, Anna ; Bourbakis, Nicolaos G.
Author_Institution :
Wright State Univ., Dayton, OH, USA
Abstract :
Security has always been an important concern in computer systems. With the advent of the Internet, the sharing of information has never been easier. However, the Internet infrastructure has proven to be very vulnerable to many security threats. Examples of attacks date from the infamous Morris worm, which in 1988 managed to infect thousands of computer systems, including military and medical research systems, resulting in an economic impact of millions of dollars, to the recent zero-day exploit in Internet Explorer, which caused the German government to urge the public to temporarily stop using the browser.
Keywords :
Internet; invasive software; Internet Explorer; Internet infrastructure; computer systems; control flow hijacking attacks; infamous Morris worm; protection methodologies; security; Computer crime; Computer hacking; Computer security; Internet; Memory management; Process control;
Journal_Title :
Potentials, IEEE
DOI :
10.1109/MPOT.2014.2344211