Exploitation vs. Prevention: The ongoing saga of software vulnerabilities

5Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Online IT systems are frequently exposed to cyber-attacks. An Exploit is an advanced attack tool that takes advantage of some software vulnerability to attack and cause harm to IT infrastructures. Developers and manufacturers of operating systems and hardware put huge effort into the prevention of vulnerability exploitation (e.g. Data Execution Prevention, Control Flow Integrity, etc.). However, the number and severity of attacks show that new exploit methods are continuously being invented despite the increasingly sophisticated protection methods. The present article summarizes the current, known and most relevant software vulnerability exploitation methods, as well as, the possible methods used to protect against these exploits. Moreover, the effectiveness of both the exploitation and prevention methods (as seen from both the attacker’s and the defender’s sides) is analyzed to find a possible future direction, to eliminate exploit attacks against an IT infrastructure.

Cite

CITATION STYLE

APA

Erdődi, L., & Jøsang, A. (2020). Exploitation vs. Prevention: The ongoing saga of software vulnerabilities. Acta Polytechnica Hungarica, 17(7), 199–218. https://doi.org/10.12700/APH.17.7.2020.7.11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free