Große Auswahl an günstigen Büchern
Schnelle Lieferung per Post und DHL

Implementing a software vulnerabilities system

Über Implementing a software vulnerabilities system

Software bugs that result in memory corruption are a common and dangerous feature of systems developed in certain programming languages. Such bugs are security vulnerabilities if they can be leveraged by an attacker to trigger the execution of malicious code. Determining if such a possibility exists is a time consuming process and requires technical expertise in a number of areas. Often the only way to be sure that a bug is in fact exploitable by an attacker is to build a complete exploit. It is this process that we seek to automate. We present a novel algorithm that integrates data-flow analysis and a decision procedure with the aim of automatically building exploits. The exploits we generate are constructed to hijack the control flow of an application and redirect it to malicious code.

Mehr anzeigen
  • Sprache:
  • Englisch
  • ISBN:
  • 9786207459315
  • Einband:
  • Taschenbuch
  • Seitenzahl:
  • 76
  • Veröffentlicht:
  • 17. Januar 2024
  • Abmessungen:
  • 150x5x220 mm.
  • Gewicht:
  • 131 g.
  Versandkostenfrei
  Versandfertig in 1-2 Wochen.

Beschreibung von Implementing a software vulnerabilities system

Software bugs that result in memory corruption are a common and dangerous feature of systems developed in certain programming languages. Such bugs are security vulnerabilities if they can be leveraged by an attacker to trigger the execution of malicious code. Determining if such a possibility exists is a time consuming process and requires technical expertise in a number of areas. Often the only way to be sure that a bug is in fact exploitable by an attacker is to build a complete exploit. It is this process that we seek to automate. We present a novel algorithm that integrates data-flow analysis and a decision procedure with the aim of automatically building exploits. The exploits we generate are constructed to hijack the control flow of an application and redirect it to malicious code.

Kund*innenbewertungen von Implementing a software vulnerabilities system



Willkommen bei den Tales Buchfreunden und -freundinnen

Jetzt zum Newsletter anmelden und tolle Angebote und Anregungen für Ihre nächste Lektüre erhalten.