Automated Exploit Generation for Control-Flow Hijacking Attacks

碩士 === 國立交通大學 === 資訊科學與工程研究所 === 100 === Due to the rapid deployment of information technology, the threats on information assets are getting more serious. These threats are originated from software vulnerabilities. The vulnerabilities bring about attacks. If attacks launched before the public expos...

Full description

Bibliographic Details
Main Authors: Huang, Po-Yen, 黃博彥
Other Authors: Huang, Shih-Kun
Format: Others
Language:en_US
Published: 2011
Online Access:http://ndltd.ncl.edu.tw/handle/51690331523740178917