Understanding a New Memory Corruption Defense: Use-After-Free (UAF) Mitigation and Bypass

Provided by: SecurityTube.net
Topic: Security
Format: Webcast
Memory corruption has plagued computers for decades. These software bugs can often be transformed into working cyber-attacks. High-level protections, such as anti-virus, have done little to stop the tide. Recent low-level protections such as non-executable memory and module randomization have helped.

Find By Topic