Understanding a New Memory Corruption Defense: Use-After-Free (UAF) Mitigation and Bypass

Memory corruption has plagued computers for decades. These software bugs can often be transformed into working cyber-attacks. High-level protections, such as anti-virus, have done little to stop the tide. Recent low-level protections such as non-executable memory and module randomization have helped.
Provided by: SecurityTube.net Topic: Security Date Added: Feb 2015 Format: Webcast

Find By Topic