1. TÉCNICAS DE OFENSA Y DEFENSA A LOS FALLOS POR CORRUPCIÓN DE MEMORIA.
- Author
-
Mora Rodríguez, David and Muñoz, Mario
- Subjects
- *
MALWARE prevention , *DATA protection , *COMPUTER operating system security measures , *COMPUTER software development , *COMPUTER security - Abstract
Attack techniques against memory corruption applications take advantage of the programs weakness for obtaining execution of arbitrary code. These programming failures have been used for several attacks since the 80's. This document shows several techniques to be used by an attacker in order to achieve his objectives and the precautions an application developer should have for preventing the program to be exposed vulnerable situations which may allow having attacks for memory corruption. Manufacturers of operating systems and compilers introduced several defense mechanisms to protect applications. These are not excluding mechanisms and each one of them has its own design objectives for adding new security layers. [ABSTRACT FROM AUTHOR]
- Published
- 2011