DocumentCode
38616
Title
A Survey on Protection Methodologies Against Control Flow Hijacking Attacks
Author
Trikalinou, Anna ; Bourbakis, Nicolaos G.
Author_Institution
Wright State Univ., Dayton, OH, USA
Volume
33
Issue
6
fYear
2014
fDate
Nov.-Dec. 2014
Firstpage
21
Lastpage
26
Abstract
Security has always been an important concern in computer systems. With the advent of the Internet, the sharing of information has never been easier. However, the Internet infrastructure has proven to be very vulnerable to many security threats. Examples of attacks date from the infamous Morris worm, which in 1988 managed to infect thousands of computer systems, including military and medical research systems, resulting in an economic impact of millions of dollars, to the recent zero-day exploit in Internet Explorer, which caused the German government to urge the public to temporarily stop using the browser.
Keywords
Internet; invasive software; Internet Explorer; Internet infrastructure; computer systems; control flow hijacking attacks; infamous Morris worm; protection methodologies; security; Computer crime; Computer hacking; Computer security; Internet; Memory management; Process control;
fLanguage
English
Journal_Title
Potentials, IEEE
Publisher
ieee
ISSN
0278-6648
Type
jour
DOI
10.1109/MPOT.2014.2344211
Filename
6954518
Link To Document