Date: 2014-05-29 15:38:01Computing Computer security Software bugs Address space layout randomization Gadget Buffer overflow Return-to-libc attack Shellcode Instruction selection Position-independent code NOP Return-oriented programming | | Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.eduAdd to Reading ListSource URL: users.ece.cmu.eduDownload Document from Source Website File Size: 685,72 KBShare Document on Facebook
|