#Capturing #0day #Exploits with PERFectly Placed #Hardware #Traps | ENDGAME

#Capturing #0day #Exploits with PERFectly Placed #Hardware #Traps | ENDGAME

http://ift.tt/2clV4kj

Most defenses focus on the post-exploitation stage of the attack, by which point it is too late and the attacker will always maintain the advantage. Instead of focusing on the post-exploitation stage, we leverage the enforcement of coarse-grained Control Flow Integrity (CFI) to enhance real-time detection at the exploitation stage, with minimal impact on performance.

APT

via Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it http://ift.tt/1PrSk69

September 2, 2016 at 04:45PM