Research Article

A Detection Approach for Vulnerability Exploiter Based on the Features of the Exploiter

Table 2

The detection results of exploits.

CVE numberDetect methodResult

CVE-2018-9131DEP0
ASLR0
JCFG-VEDM1

CVE-2018-6481DEP0
ASLR0
JCFG-VEDM1

CVE-2017-14627DEP0
ASLR0
JCFG-VEDM1

CVE-2017-8869DEP0
ASLR0
JCFG-VEDM1

CVE-2017-8870DEP0
ASLR0
JCFG-VEDM1