Matches in SemOpenAlex for { <https://semopenalex.org/work/W2144707943> ?p ?o ?g. }
Showing items 1 to 62 of
62
with 100 items per page.
- W2144707943 abstract "The existing code injection attack defense methods have some deficiencies on performance overhead and effectiveness. In order to ensure the system performance, we propose a method that uses system call randomization to counter code injection attacks based on instruction set randomization idea. An injected code would perform its actions with system calls. System call randomization on operating system level will prevent the injected code from executing correctly. Moreover, with an extended compiler, our method can perform source code randomization during compiling and implement binary executable files randomization by feature matching. The experiments show that our method can effectively counter variety code injection attacks with low overhead." @default.
- W2144707943 created "2016-06-24" @default.
- W2144707943 creator A5011376755 @default.
- W2144707943 creator A5022263689 @default.
- W2144707943 creator A5047014488 @default.
- W2144707943 creator A5059609899 @default.
- W2144707943 creator A5060870537 @default.
- W2144707943 creator A5074397094 @default.
- W2144707943 date "2009-04-01" @default.
- W2144707943 modified "2023-09-24" @default.
- W2144707943 title "Against Code Injection with System Call Randomization" @default.
- W2144707943 cites W2101699859 @default.
- W2144707943 cites W2114792143 @default.
- W2144707943 doi "https://doi.org/10.1109/nswctc.2009.39" @default.
- W2144707943 hasPublicationYear "2009" @default.
- W2144707943 type Work @default.
- W2144707943 sameAs 2144707943 @default.
- W2144707943 citedByCount "9" @default.
- W2144707943 countsByYear W21447079432015 @default.
- W2144707943 countsByYear W21447079432016 @default.
- W2144707943 countsByYear W21447079432017 @default.
- W2144707943 countsByYear W21447079432018 @default.
- W2144707943 crossrefType "proceedings-article" @default.
- W2144707943 hasAuthorship W2144707943A5011376755 @default.
- W2144707943 hasAuthorship W2144707943A5022263689 @default.
- W2144707943 hasAuthorship W2144707943A5047014488 @default.
- W2144707943 hasAuthorship W2144707943A5059609899 @default.
- W2144707943 hasAuthorship W2144707943A5060870537 @default.
- W2144707943 hasAuthorship W2144707943A5074397094 @default.
- W2144707943 hasConcept C141071460 @default.
- W2144707943 hasConcept C168563851 @default.
- W2144707943 hasConcept C177264268 @default.
- W2144707943 hasConcept C199360897 @default.
- W2144707943 hasConcept C204243189 @default.
- W2144707943 hasConcept C2776760102 @default.
- W2144707943 hasConcept C41008148 @default.
- W2144707943 hasConcept C71924100 @default.
- W2144707943 hasConceptScore W2144707943C141071460 @default.
- W2144707943 hasConceptScore W2144707943C168563851 @default.
- W2144707943 hasConceptScore W2144707943C177264268 @default.
- W2144707943 hasConceptScore W2144707943C199360897 @default.
- W2144707943 hasConceptScore W2144707943C204243189 @default.
- W2144707943 hasConceptScore W2144707943C2776760102 @default.
- W2144707943 hasConceptScore W2144707943C41008148 @default.
- W2144707943 hasConceptScore W2144707943C71924100 @default.
- W2144707943 hasLocation W21447079431 @default.
- W2144707943 hasOpenAccess W2144707943 @default.
- W2144707943 hasPrimaryLocation W21447079431 @default.
- W2144707943 hasRelatedWork W1522113126 @default.
- W2144707943 hasRelatedWork W1527862632 @default.
- W2144707943 hasRelatedWork W2109507516 @default.
- W2144707943 hasRelatedWork W2112962394 @default.
- W2144707943 hasRelatedWork W2118300983 @default.
- W2144707943 hasRelatedWork W2135396778 @default.
- W2144707943 hasRelatedWork W2380602769 @default.
- W2144707943 hasRelatedWork W2384847609 @default.
- W2144707943 hasRelatedWork W3137189469 @default.
- W2144707943 hasRelatedWork W4243252198 @default.
- W2144707943 isParatext "false" @default.
- W2144707943 isRetracted "false" @default.
- W2144707943 magId "2144707943" @default.
- W2144707943 workType "article" @default.