آپلود ویدئو | ورود | ثبت نام


ahmadaa-

Blackhat 2010 - Return-Oriented Exploitation


Embed گزارش تخلف

مشاهده 981

دریافت ویدئو: حجم کم کیفیت بالا
توسط ahmadaa در 25 Mar 2019
توضیحات:

This video is part of the Infosec Video Collection at SecurityTube.net: http://www.securitytube.net

Return-Oriented Exploitation

The latest advances in exploitation of memory corruption vulnerabilities revolve around applying return-oriented exploitation techniques to evade non-executable memory protections such as Microsoft's Data Execution Prevention (DEP), CPU-supported non-executable memory (NX/XD), and mandatory code-signing such as on iPhone OS. Although the ideas behind these exploitation techniques can be traced quite far back, they are receiving more attention as non-executable memory protections become more prevalent. This presentation will cover the current state of memory corruption exploitation and exploit mitigation as well as an in-depth discussion of a variety of return-oriented exploitation techniques. Finally, the presentation will discuss what ramifications return-oriented exploitation techniques have for exploit developers, software vendors, malware analysts, and enterprise IT security professionals.
All Videos Are Listed At :- http://archive.org/details/blackhat2010usavideo

لغات کلیدی:


comments powered by Disqus

درباره ما | تماس با ما | قوانین تخته سفید