Using run-time randomization against memory corruption attacks on legacy binaries

X. Chen

Research output: PhD ThesisPhD Thesis - Research VU, graduation VUAcademic

Original languageEnglish
QualificationPhD
Awarding Institution
  • Vrije Universiteit Amsterdam
Supervisors/Advisors
  • Bos, H.J., Supervisor
  • Giuffrida, C., Co-supervisor
Award date3 May 2017
Print ISBNs9789463321730
Publication statusPublished - 2017

Keywords

  • Memory corruption
  • Randomization
  • Address space
  • Security
  • Legacy binary

Cite this

@phdthesis{71b529e32da641fe8c519cbd8ff48c80,
title = "Using run-time randomization against memory corruption attacks on legacy binaries",
keywords = "Memory corruption, Randomization, Address space, Security, Legacy binary",
author = "X. Chen",
year = "2017",
language = "English",
isbn = "9789463321730",
school = "Vrije Universiteit Amsterdam",

}

Using run-time randomization against memory corruption attacks on legacy binaries. / Chen, X.

2017. 142 p.

Research output: PhD ThesisPhD Thesis - Research VU, graduation VUAcademic

TY - THES

T1 - Using run-time randomization against memory corruption attacks on legacy binaries

AU - Chen, X.

PY - 2017

Y1 - 2017

KW - Memory corruption

KW - Randomization

KW - Address space

KW - Security

KW - Legacy binary

M3 - PhD Thesis - Research VU, graduation VU

SN - 9789463321730

ER -