29,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
  • Broschiertes Buch

This book considers the problem of automatic generation of exploits for software vulnerabilities. A formal definition will be provided for the term "exploit" in Chapter 2 but, informally, it describes an exploit as a program input that results in the execution of malicious code1. We define malicious code as a sequence of bytes injected by an attacker into the program that subverts the security of the targeted system. This is typically called shellcode. Exploits of this kind often take advantage of programmer errors relating to memory management or variable typing in applications developed in C…mehr

Produktbeschreibung
This book considers the problem of automatic generation of exploits for software vulnerabilities. A formal definition will be provided for the term "exploit" in Chapter 2 but, informally, it describes an exploit as a program input that results in the execution of malicious code1. We define malicious code as a sequence of bytes injected by an attacker into the program that subverts the security of the targeted system. This is typically called shellcode. Exploits of this kind often take advantage of programmer errors relating to memory management or variable typing in applications developed in C and C++. These errors can lead to buffer overflows in which too much data is written to a memory buffer, resulting in the corruption of unintended memory locations. An exploit will leverage this corruption to manipulate sensitive memory locations with the aim of hijacking the control flow of the application.
Autorenporträt
Professor Dr. Essam Mohamed Elwan, PhD in Strategic Management. Head of the Information Technology Department at the College of Engineering, UAE University. Professor at Al Ain University of Science and Technology in Al Ain. Academic and educational advisor on the development of scientific and educational curricula at the Emirates University.