ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2503.22765
37
0

Non-control-Data Attacks and Defenses: A review

27 March 2025
Lei Chong
    AAML
ArXivPDFHTML
Abstract

In recent years, non-control-data attacks have be come a research hotspot in the field of network security, drivenby the increasing number of defense methods against control-flowhijacking attacks. These attacks exploit memory vulnerabilitiesto modify non-control data within a program, thereby altering itsbehavior without compromising control-flow integrity. Researchhas shown that non-control-data attacks can be just as damagingas control-flow hijacking attacks and are even Turing complete,making them a serious security threat. However, despite beingdiscovered long ago, the threat of non-control-data attacks hasnot been adequately addressed. In this review, we first classifynon-control-data attacks into two categories based on theirevolution: security-sensitive function attacks and data-orientedprogramming (DOP) attacks. Subsequently, based on the non control-data attack model, we categorize existing defense methodsinto three main strategies: memory safety, data confidentiality,and data integrity protection. We then analyze recent defensetechniques specifically designed for DOP attacks. Finally, weidentify the key challenges hindering the widespread adoptionof defenses against non-control-data attacks and explore futureresearch directions in this field.

View on arXiv
@article{chong2025_2503.22765,
  title={ Non-control-Data Attacks and Defenses: A review },
  author={ Lei Chong },
  journal={arXiv preprint arXiv:2503.22765},
  year={ 2025 }
}
Comments on this paper