• DocumentCode
    38616
  • Title

    A Survey on Protection Methodologies Against Control Flow Hijacking Attacks

  • Author

    Trikalinou, Anna ; Bourbakis, Nicolaos G.

  • Author_Institution
    Wright State Univ., Dayton, OH, USA
  • Volume
    33
  • Issue
    6
  • fYear
    2014
  • fDate
    Nov.-Dec. 2014
  • Firstpage
    21
  • Lastpage
    26
  • Abstract
    Security has always been an important concern in computer systems. With the advent of the Internet, the sharing of information has never been easier. However, the Internet infrastructure has proven to be very vulnerable to many security threats. Examples of attacks date from the infamous Morris worm, which in 1988 managed to infect thousands of computer systems, including military and medical research systems, resulting in an economic impact of millions of dollars, to the recent zero-day exploit in Internet Explorer, which caused the German government to urge the public to temporarily stop using the browser.
  • Keywords
    Internet; invasive software; Internet Explorer; Internet infrastructure; computer systems; control flow hijacking attacks; infamous Morris worm; protection methodologies; security; Computer crime; Computer hacking; Computer security; Internet; Memory management; Process control;
  • fLanguage
    English
  • Journal_Title
    Potentials, IEEE
  • Publisher
    ieee
  • ISSN
    0278-6648
  • Type

    jour

  • DOI
    10.1109/MPOT.2014.2344211
  • Filename
    6954518