#Capturing #0day #Exploits with PERFectly Placed #Hardware #Traps | ENDGAME

#Capturing #0day #Exploits with PERFectly Placed #Hardware #Traps | ENDGAME

http://ift.tt/2clV4kj

Most defenses focus on the post-exploitation stage of the attack, by which point it is too late and the attacker will always maintain the advantage. Instead of focusing on the post-exploitation stage, we leverage the enforcement of coarse-grained Control Flow Integrity (CFI) to enhance real-time detection at the exploitation stage, with minimal impact on performance.

See it on Scoop.it, via Advanced Threats,Intelligence Technology,CyberSecurity

APT

via Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it http://ift.tt/1PrSk69

September 2, 2016 at 04:45PM


Posted

in

by

Tags:

Comments

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: