Automated Exploit Generation for Control-Flow Hijacking Attacks
碩士 === 國立交通大學 === 資訊科學與工程研究所 === 100 === Due to the rapid deployment of information technology, the threats on information assets are getting more serious. These threats are originated from software vulnerabilities. The vulnerabilities bring about attacks. If attacks launched before the public expos...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2011
|
Online Access: | http://ndltd.ncl.edu.tw/handle/51690331523740178917 |