[Microsoft]Software Defense Series: Exploit mitigation and vulnerability detection

Discussion in 'malware problems & news' started by ronjor, Sep 27, 2013.

Thread Status:
Not open for further replies.
  1. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    163,027
    Location:
    Texas
    http://blogs.technet.com/b/srd/arch...-vulnerability-detection.aspx?Redirected=true
     
  2. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    163,027
    Location:
    Texas
    http://blogs.technet.com/b/srd/arch...orruption-vulnerabilties.aspx?Redirected=true
     
  3. Escalader

    Escalader Registered Member

    Joined:
    Dec 12, 2005
    Posts:
    3,710
    Location:
    Land of the Mooses
    Thanks Ron;:thumb:

    I will read the links when more time is available.

    BUT did you notice any references to EMET?
     
  4. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    163,027
    Location:
    Texas
    Not yet. This is a series though.
     
  5. Escalader

    Escalader Registered Member

    Joined:
    Dec 12, 2005
    Posts:
    3,710
    Location:
    Land of the Mooses
    EMET is a MS product for exploit mitigation.

    Attached a snap.
     

    Attached Files:

  6. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    163,027
    Location:
    Texas
    http://blogs.technet.com/b/srd/arch...-exploitation-techniques.aspx?Redirected=true
     
  7. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    From master's thesis "Memory Corruption Mitigations and Their Implementation Progress in Third-Party Windows Applications" (2012) (direct link: hxxp://calhoun.nps.edu/public/bitstream/handle/10945/17337/12Sep_Cevik_Serbulent.pdf ):
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.