It is the only tool on the market that comprises technologies for detecting and deceiving cyberattacks. This technology acts on-the-fly. Precisely, Cyber Escort Unit (CyberEU in short) is a two-fold technology aiming to protect against four threats:
- Return oriented programming (ROP), Jump Oriented Programming (JOP): The attacker reuses chunks of code to assemble a malicious program as a patchwork.
- Stack Smashing, by exploiting a buffer over run or integer under-or-overflow etc.: the attacker crafts some fake stack frames in order to change the program context.
- Executable Code Modification, Overwrite: the attacker manages to change the genuine program into a malicious program.
- Control Flow hijacking: the attacker manipulates the program so that it calls an illicit function, or it takes an illicit branch.
Those threats represent a large amount of vulnerabilities encountered in practice. For instance, more than a quarter of the attacks on Supervisory control and Data Acquisition systems (Figure 1) consist in improper restrictions of operations within the bounds of a memory buffer.