Evaluation of the Executional Power in Windows Using Return Oriented Programming
Offered By: IEEE via YouTube
Course Description
Overview
Explore the intricacies of Return Oriented Programming (ROP) in Windows systems through this 23-minute IEEE conference talk. Delve into the research conducted by Daniel Uroz and Ricardo J. RodrÃguez from Universidad de Zaragoza, presented at the 15th IEEE Workshop on Offensive Technologies. Gain insights into the evaluation of executional power in Windows using ROP techniques. Follow the presentation's structure, covering the introduction, virtual language concepts, key results, in-depth discussion, and concluding remarks. Enhance your understanding of advanced exploitation techniques and their implications for Windows security.
Syllabus
Introduction
Virtual Language
Results
Discussion
Conclusion
Taught by
IEEE Symposium on Security and Privacy
Tags
Related Courses
Enter SandboxBlack Hat via YouTube Spectre Attacks Exploiting Speculative Execution
IEEE via YouTube Return to the Zombie Gadgets - Undermining Destructive Code Reads via Code-Inference Attacks
IEEE via YouTube ROP is Still Dangerous - Breaking Modern Defenses
USENIX via YouTube How to Cook Cisco: Exploit Development for Cisco IOS - George Nosenko - Ekoparty Security Conference - 2017
Ekoparty Security Conference via YouTube