Voting machines must remain secure throughout their entire service lifetime, and this study demonstrates how a relatively new programming technique can be used to take control of a voting machine that ...
In this video from the SOURCE conference in Boston, security researcher Dino Dai Zovi discusses the details of return-oriented programming and the ways in which it can be used to exploit ...
Intel has come up with a chip-level plan to defeat attacks that use return-oriented programming to exploit memory vulnerabilities. The new measures are outlined in a preview specification from Intel ...
Several years ago, Microsoft released the Enhanced Mitigation Experience Toolkit (EMET), a free tool that can help Windows users beef up the security of third-party applications. This week, Microsoft ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results