Code-Reuse Attacks and Defenses
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almost three decades and no end seems to be in sight. In particular, code-reuse techniques such as return-oriented programming offer a robust attack technique that is extensively used to exploit memory co...
Main Author: | |
---|---|
Format: | Others |
Language: | German en |
Published: |
2015
|
Online Access: | https://tuprints.ulb.tu-darmstadt.de/4622/7/Davi-PhD-Code-Reuse-Attacks-and-Defenses.pdf Davi, Lucas Vincenzo <http://tuprints.ulb.tu-darmstadt.de/view/person/Davi=3ALucas_Vincenzo=3A=3A.html> (2015): Code-Reuse Attacks and Defenses.Darmstadt, Technische Universität, [Ph.D. Thesis] |