News
Software Defense: mitigating stack corruption vulnerabilties | MSRC Blog
Software Defense: mitigating stack corruption vulnerabilties | MSRC Blog Introduction One of the oldest forms of memory safety exploitation is that of stack corruption vulnerabilities, with several early high-profile exploits being of this type. It seems fitting therefore to kick off this Software Defense series by looking at the status Read more…