This is an old revision of the document!


Lecture 08 - Exploit Protection Mechanisms

  • Keywords: exploit, buffer overflow, shellcode, input validation, static analysis, dynamic analysis, code integrity, DEP, ASLR, PIC, PIE, canary value, stack guard

cns/lectures/lecture-08.1509298531.txt.gz ยท Last modified: 2017/10/29 19:35 by razvan.deaconescu
CC Attribution-Share Alike 3.0 Unported
www.chimeric.de Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0