• caglararli@hotmail.com
  • 05386281520

Preventing the Exploitation of Structured Exception Handler (SEH) Overwrites with SEHOP

Çağlar Arlı      -    10 Views

Preventing the Exploitation of Structured Exception Handler (SEH) Overwrites with SEHOP

One of the responsibilities of Microsoft’s Security Engineering Center is to investigate defense in depth techniques that can be used to make it harder for attackers to successfully exploit a software vulnerability. These techniques are commonly referred to as exploit mitigations and have been delivered to users in the form of features like /GS, Data Execution Prevention (DEP), and Address Space Layout Randomization (ASLR).