Skip to main navigation
Skip to search
Skip to main content
Penn State Home
Help & FAQ
Home
Researchers
Research output
Research units
Equipment
Grants & Projects
Prizes
Activities
Search by expertise, name or affiliation
VIPER: Spotting Syscall-Guard Variables for Data-Only Attacks
Hengkai Ye
, Song Liu
, Zhechang Zhang
,
Hong Hu
College of Information Sciences and Technology
Research output
:
Chapter in Book/Report/Conference proceeding
›
Conference contribution
11
Scopus citations
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'VIPER: Spotting Syscall-Guard Variables for Data-Only Attacks'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Guard
100%
Viper
100%
Data Injection Attack
100%
Syscalls
100%
Attacker
40%
Automatically Identify
40%
System Call
40%
Program Control
20%
Control Flow
20%
Corrupt
20%
Memory Errors
20%
Operating System
20%
Critical Security
20%
Severe Attack
20%
Solution Set
20%
Hijack
20%
Data Flow Analysis
20%
Protection Method
20%
Function Pointer
20%
Control Information
20%
Non-control Data
20%
Conditional Branch
20%
SQLite
20%
Computer Science
Control Flow
100%
Attackers
66%
System Calls
66%
Function Pointer
33%
Protection Technique
33%
Conditional Branch
33%
Operating System
33%