Lecture

Software Security: Execution Attacks and Defenses

In course
DEMO: laboris quis et fugiat
Consectetur officia sunt nostrud dolor enim cupidatat. Sunt pariatur nulla anim anim labore ut voluptate eu culpa aliquip. Lorem sunt incididunt pariatur ad deserunt sint sunt. Eiusmod nisi id commodo veniam sint qui sit.
Login to see this section
Description

This lecture covers code injection attacks, control-flow hijack attacks, and deployed defenses such as Data Execution Prevention, Stack Canaries, and Address Space Layout Randomization. It explains how attackers force memory corruption to redirect control-flow and discusses the weaknesses and limitations of these defenses.

Instructors (2)
exercitation amet laborum
Veniam culpa proident irure reprehenderit elit. Et dolore voluptate tempor adipisicing velit ullamco mollit excepteur adipisicing culpa. Esse et ut eu id. Culpa nostrud elit eiusmod non et ad non mollit esse. Anim laboris consectetur mollit officia officia ex reprehenderit. Pariatur ut deserunt proident culpa consectetur sit enim incididunt laboris consectetur eiusmod aliquip id.
occaecat est
Qui officia sunt incididunt enim qui sunt aute nulla quis veniam irure. Ex do ut nostrud sunt. Ullamco cupidatat est qui in aliquip sint veniam pariatur enim anim veniam anim laborum mollit. Nisi aliquip minim sint cupidatat occaecat nisi voluptate esse minim in eiusmod do aliquip.
Login to see this section
About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.
Related lectures (33)
Web and Software Bugs
Explores vulnerabilities in web and software applications, discussing broken access control, injection flaws, and defense strategies like DEP and ASLR.
Software Security: Vulnerabilities and Mitigations
Discusses security vulnerabilities in software and effective mitigation strategies.
Software Security: Memory Safety and Execution Attacks
Covers memory safety, execution attacks, vulnerabilities, and defense mechanisms in software security.
Understanding Stack Data: Arrays and Pointers
Explores stack organization, return addresses, and array overflow cases.
Effects of Array Overflow
Explores the impact of array overflow on function calls and memory allocation in C++.
Show more

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.