Große Auswahl an günstigen Büchern
Schnelle Lieferung per Post und DHL

Automatic Generation of Control

Automatic Generation of Controlvon Esam Mohamed Elwan Sie sparen 16% des UVP sparen 16%
Über Automatic Generation of Control

This book considers the problem of automatic generation of exploits for software vulnerabilities. A formal definition will be provided for the term ¿exploit¿ in Chapter 2 but, informally, it describes an exploit as a program input that results in the execution of malicious code1. We define malicious code as a sequence of bytes injected by an attacker into the program that subverts the security of the targeted system. This is typically called shellcode. Exploits of this kind often take advantage of programmer errors relating to memory management or variable typing in applications developed in C and C++. These errors can lead to buffer overflows in which too much data is written to a memory buffer, resulting in the corruption of unintended memory locations. An exploit will leverage this corruption to manipulate sensitive memory locations with the aim of hijacking the control flow of the application.

Mehr anzeigen
  • Sprache:
  • Englisch
  • ISBN:
  • 9786207447145
  • Einband:
  • Taschenbuch
  • Seitenzahl:
  • 72
  • Veröffentlicht:
  • 2. Dezember 2023
  • Abmessungen:
  • 150x5x220 mm.
  • Gewicht:
  • 125 g.
  Versandkostenfrei
  Versandfertig in 1-2 Wochen.

Beschreibung von Automatic Generation of Control

This book considers the problem of automatic generation of exploits for software vulnerabilities. A formal definition will be provided for the term ¿exploit¿ in Chapter 2 but, informally, it describes an exploit as a program input that results in the execution of malicious code1. We define malicious code as a sequence of bytes injected by an attacker into the program that subverts the security of the targeted system. This is typically called shellcode. Exploits of this kind often take advantage of programmer errors relating to memory management or variable typing in applications developed in C and C++. These errors can lead to buffer overflows in which too much data is written to a memory buffer, resulting in the corruption of unintended memory locations. An exploit will leverage this corruption to manipulate sensitive memory locations with the aim of hijacking the control flow of the application.

Kund*innenbewertungen von Automatic Generation of Control



Willkommen bei den Tales Buchfreunden und -freundinnen

Jetzt zum Newsletter anmelden und tolle Angebote und Anregungen für Ihre nächste Lektüre erhalten.