control-flow hijacking and code reuse attacks
Control-flow hijacking refers to a type of security exploitation where an attacker takes control over the sequence of instructions executed in a program. By altering the normal flow of a program, an attacker can execute malicious code instead of the intended instructions, leading to unauthorized actions or unauthorized access to sensitive data. Code reuse attacks, on the other hand, involve an attacker leveraging existing code fragments or functionalities in a program to carry out malicious activities. Instead of injecting new code, attackers reuse existing code sequences (often called gadgets) to manipulate the behavior and achieve their objectives, such as privilege escalation or executing arbitrary commands. These attacks take advantage of code fragments that can be found in libraries, operating systems, or other software components.
Requires login.
Related Concepts (1)
Similar Concepts
- code injection attacks
- code reuse attacks
- control flow hijacking
- control-flow attack
- control-flow hijacking
- control-flow hijacking detection
- control-flow hijacking mitigations
- control-flow integrity
- control-flow integrity bypass
- control-flow integrity enforcement
- control-flow integrity mitigations
- control-flow integrity protection
- control-flow obfuscation
- remote code execution attacks
- shellcode injection attacks