Method and system for detecting IA32 targeted buffer overflow attacks

作者: Elias Levy

DOI:

关键词:

摘要: Data streams are scanned to detect malicious jump-call-pop shellcode constructs used in attacks against stack-based buffer overflow vulnerabilities on software executing in the IA32 architecture prior to execution. Upon a detection of a malicious jump-call-pop shellcode construct, protective action is taken, such as preventing the malicious shellcode from executing.

参考文章(0)