One way to prevent control hijacking attack is to compare a network application’s run-time system calls with a pre-defined normal system call behavior model, and raise an alert...
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...