Downloads: 121 | Views: 132
Research Paper | Information Technology | India | Volume 4 Issue 3, March 2015
Exploit Development Research on x86 Windows Application: Buffer Overflow
Geogen George [4] | Sivasundaram R
Abstract: The Best way to find vulnerability present with an application is to presume you as Hacker and act accordingly. Hackers always find one or other way to bypass all the security measures taken by the developers. So before releasing a developed software application, it
Keywords: Vulnerability Testing, Exploit Development, Bypass DEP, ASLR, SEH, Egg Hunting
Edition: Volume 4 Issue 3, March 2015,
Pages: 636 - 640
Similar Articles with Keyword 'SEH'
Downloads: 109
Review Papers, Information Technology, Kenya, Volume 7 Issue 11, November 2018
Pages: 1510 - 1514Organizational Capabilities and E-Waste Management: A Theoretical Review
Sophia Jeptarus Kipkoech | David M. Nzuki [5]
Downloads: 109
Research Paper, Information Technology, Burkina Faso, Volume 8 Issue 10, October 2019
Pages: 1468 - 1471The Determinants of Internet Adoption among Urban Heads of Household in Burkina, Faso
KABORE Theophile