1. 首页
  2. 数据库
  3. 其它
  4. Program Analysis with PREfast and SAL Erik Poll Slides (3_StaticAnalysisPREf

Program Analysis with PREfast and SAL Erik Poll Slides (3_StaticAnalysisPREf

上传者: 2021-04-26 02:07:00上传 PDF文件 523.76KB 热度 10次
Software SecurityProgram Analysis with PREfast & SALErik PollDigital Security groupRadboud University Nijmegen1Recap from last week• Buffer overflows notorious source of security flaws in C(++) code– Classic example: attacker overflows buffer on the stack, to inject hisown machine code (aka shell code) and corrupt control data (ie. thereturn address) to execute this codePreventable by distinguishing W  X : (non)executable memory– Or: attacker corrupts control data to execute other code (library
下载地址
用户评论