A lightweight protection mechanism for preventing exploitation through abusing dynamic function resolving
碩士 === 國立中正大學 === 資訊工程研究所 === 107 === In the arm race between protection and exploitation on leveraging memory corruption, return-to-dl-resolve exploit provide attackers another way to invoke arbitrary library functions. This exploitation later has evolved into a powerful exploitation because of R...
Main Authors: | CHANG, YU-TUNG, 張宇彤 |
---|---|
Other Authors: | LIN, PO-CHING |
Format: | Others |
Language: | en_US |
Published: |
2019
|
Online Access: | http://ndltd.ncl.edu.tw/handle/22pk2s |
Similar Items
-
Exploiting Motion Perception in Depth Estimation Through a Lightweight Convolutional Neural Network
by: Pedro Nuno Leite, et al.
Published: (2021-01-01) -
Protection of childrens' rights in peacekeeping missions : analysis of sexual exploitation and sexual abuse
by: Nkounkou-Ngongo, Estelle Inès
Published: (2008) -
Protection from sexual exploitation and abuse in humanitarian crises: the humanitarian community’s response
by: Iain Levine, et al.
Published: (2002-10-01) -
INDONESIAN CHILDREN PROTECTION POLICY AS A PREVENTION OF SEXUAL EXPLOITATION THROUGH SOCIAL MEDIA
by: Ikhsan Ikhsan, et al.
Published: (2020-12-01) -
Preventing Offenses of Sexual Abuse, Sexual Exploitation of Children and Child Pornography in the European Union
by: Ion RUSU
Published: (2012-08-01)