Browsing Institute for Information Security & Privacy (IISP) by Subject "Memory corruption"
Now showing items 1-1 of 1
-
Why Memory Corruption is Hard
(Georgia Institute of Technology, 2017-09-08)Memory corruption has plagued systems since the dawn of computing. With the rise of defense techniques (such as stack cookies, ASLR, and DEP), attacks have become much more complicated, yet control-flow hijack attacks are ...