Lecture

Software Security: Execution Attacks and Defenses

Description

This lecture covers code injection attacks, control-flow hijack attacks, and deployed defenses such as Data Execution Prevention, Stack Canaries, and Address Space Layout Randomization. It explains how attackers force memory corruption to redirect control-flow and discusses the weaknesses and limitations of these defenses.

About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.