Treballs Finals de Grau d'Enginyeria Informàtica, Facultat de Matemàtiques, Universitat de Barcelona, Any: 2021, Director: Raúl Roca Cánovas[en] Binaries, or programs compiled down to executables, might come with errors or bugs that could trigger behavior unintended by their authors. By carefully understanding the environment where programs get executed, the instructions and the memory, an attacker can gracefully craft a specific input, tailored to trigger these unintended behaviors and gain control over the original logic of the program. One of the ways this could be achieved, is by corrupting critical values in memory. This works focuses on the main techniques to exploit buffer overfows and other memory corruption vulnerabilities to expl...
Return oriented programming (ROP) attacks have been studied for many years, but they are usually sti...
All binaries compiled by recent versions of GCC from C++ programs include complex data and dedicated...
Malware developers increasingly evolve their techniques to effectively attack the system, one of the...
The proliferation of binary-only program analysis techniques like fuzz testing and symbolic analysis...
El número de malware crece tan rápido como el número de vulnerabilidades que pueden ser explotadas ...
Software written in programming languages that permit manual memory management, such as C and C++, a...
Security is becoming a major concern in software development, both for software editors, end-users, ...
Ankara : The Department of Computer Engineering and the Institute of Engineering and Science of Bilk...
Tesis (Lic. en Ciencias. de la Computación)--Universidad Nacional de Córdoba, Facultad de Matemática...
Today there are many techniques that allows to exploit vulnerabilities of an application; there are ...
The study of vulnerabilities and exploitation is one of finding mechanisms affecting the flow of com...
Software is still being produced and used that is vulnerable to exploitation. As well as being in de...
Adversaries exploit software vulnerabilities in modern software to compromise computer systems. Whil...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
Return oriented programming (ROP) attacks have been studied for many years, but they are usually sti...
All binaries compiled by recent versions of GCC from C++ programs include complex data and dedicated...
Malware developers increasingly evolve their techniques to effectively attack the system, one of the...
The proliferation of binary-only program analysis techniques like fuzz testing and symbolic analysis...
El número de malware crece tan rápido como el número de vulnerabilidades que pueden ser explotadas ...
Software written in programming languages that permit manual memory management, such as C and C++, a...
Security is becoming a major concern in software development, both for software editors, end-users, ...
Ankara : The Department of Computer Engineering and the Institute of Engineering and Science of Bilk...
Tesis (Lic. en Ciencias. de la Computación)--Universidad Nacional de Córdoba, Facultad de Matemática...
Today there are many techniques that allows to exploit vulnerabilities of an application; there are ...
The study of vulnerabilities and exploitation is one of finding mechanisms affecting the flow of com...
Software is still being produced and used that is vulnerable to exploitation. As well as being in de...
Adversaries exploit software vulnerabilities in modern software to compromise computer systems. Whil...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
Return oriented programming (ROP) attacks have been studied for many years, but they are usually sti...
All binaries compiled by recent versions of GCC from C++ programs include complex data and dedicated...
Malware developers increasingly evolve their techniques to effectively attack the system, one of the...