Hardening C/C++ Programs Part II – Executable-Space Protection and ASLR
In the first part of this series we discussed the mechanics of an exploit, the general concept of hardening, and the stack protector hardening technique in particular. Some of the concepts explained there will be used here, too, so you might want to read at least the first few paragraphs. Executable-space protection As mentioned in the first part, exploits often … Continue reading Hardening C/C++ Programs Part II – Executable-Space Protection and ASLR
Copy and paste this URL into your WordPress site to embed
Copy and paste this code into your site to embed