#Capturing #0day #Exploits with PERFectly Placed #Hardware #Traps | ENDGAME
Most defenses focus on the post-exploitation stage of the attack, by which point it is too late and the attacker will always maintain the advantage. Instead of focusing on the post-exploitation stage, we leverage the enforcement of coarse-grained Control Flow Integrity (CFI) to enhance real-time detection at the exploitation stage, with minimal impact on performance.
via Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it http://ift.tt/1PrSk69
September 2, 2016 at 04:45PM