Research Article
A Detection Approach for Vulnerability Exploiter Based on the Features of the Exploiter
Table 2
The detection results of exploits.
| CVE number | Detect method | Result |
| CVE-2018-9131 | DEP | 0 | ASLR | 0 | JCFG-VEDM | 1 |
| CVE-2018-6481 | DEP | 0 | ASLR | 0 | JCFG-VEDM | 1 |
| CVE-2017-14627 | DEP | 0 | ASLR | 0 | JCFG-VEDM | 1 |
| CVE-2017-8869 | DEP | 0 | ASLR | 0 | JCFG-VEDM | 1 |
| CVE-2017-8870 | DEP | 0 | ASLR | 0 | JCFG-VEDM | 1 |
|
|