Abstract
By identifying memory pages that external I/O operations have modified, a proposed scheme blocks malicious injected code activation, accurately distinguishing an attack from legitimate code injection with negligible performance impact and no changes to the user application.
Original language | English |
---|---|
Pages | 66-72 |
Number of pages | 7 |
Volume | 47 |
No. | 7 |
Specialist publication | Computer |
DOIs | |
Publication status | Published - 2014 Jul |
Keywords
- Code injection
- TLB
- data execution prevention
- hackers
- invasive software
- security
ASJC Scopus subject areas
- General Computer Science