Block Oriented Programming: Automating Data-Only Attacks

preview_player
Показать описание
With the widespread deployment of Control-Flow Integrity (CFI), control-flow hijacking attacks, and consequently code reuse attacks, are significantly more difficult. Assessing the remaining attack surface of an application under advanced control-flow hijack defenses such as CFI and shadow stacks remains an open problem.
Рекомендации по теме
visit shbcf.ru