1Eki
Software Defense: mitigating stack corruption vulnerabilties
Introduction
One of the oldest forms of memory safety exploitation is that of stack corruption vulnerabilities, with several early high-profile exploits being of this type. It seems fitting therefore to kick off this Software Defense series by looking …