Are you an EPFL student looking for a semester project?
Work with us on data science and visualisation projects, and deploy your project as an app on top of Graph Search.
This lecture covers code injection attacks, control-flow hijack attacks, and deployed defenses such as Data Execution Prevention, Stack Canaries, and Address Space Layout Randomization. It explains how attackers force memory corruption to redirect control-flow and discusses the weaknesses and limitations of these defenses.