Research Article
A Detection Approach for Vulnerability Exploiter Based on the Features of the Exploiter
Table 2
The detection results of exploits.
| | CVE number | Detect method | Result |
| | CVE-2018-9131 | DEP | 0 | | ASLR | 0 | | JCFG-VEDM | 1 |
| | CVE-2018-6481 | DEP | 0 | | ASLR | 0 | | JCFG-VEDM | 1 |
| | CVE-2017-14627 | DEP | 0 | | ASLR | 0 | | JCFG-VEDM | 1 |
| | CVE-2017-8869 | DEP | 0 | | ASLR | 0 | | JCFG-VEDM | 1 |
| | CVE-2017-8870 | DEP | 0 | | ASLR | 0 | | JCFG-VEDM | 1 |
|
|