Sökning: "binary exploitation"

Hittade 5 uppsatser innehållade orden binary exploitation.

  1. 1. ROP-chain generation using Genetic Programming : GENROP

    Master-uppsats, Linköpings universitet/Institutionen för datavetenskap

    Författare :Jonatan Branting; [2022]
    Nyckelord :return oriented programming; genetic programming; binary exploitation; ROP; GP;

    Sammanfattning : Return Oriented Programming (ROP) is the de-facto technique used to exploit most of today’s native-code vulnerabilities hiding in old and newly developed software alike. By reusing bits and pieces of already existing code (gadgets), ROP can be used to bypass the ever-present Write ⊕ eXecute (W⊕X) security feature, which enforces memory to only be marked as either executable or writable; never both at the same time. LÄS MER

  2. 2. Detecting illegal gold mining sites in the Amazon forest : Using Deep Learning to Classify Satellites Images

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Nathan Labbe; [2021]
    Nyckelord :Deep Learning; Image Classification; Image Segmentation; Environmental Monitoring; Illegal Gold Mines Detection; Djupinlärning; bildklassificering; bildsegmentering; miljöövervakning; upptäckt av illegala guldgruvor;

    Sammanfattning : Illegal gold mining in the Amazon forest has increased dramatically since 2005 with the rise in the price of gold. The use of chemicals such as mercury, which facilitate the gold extraction, increases the toxicity of the soil and can enter the food chain, leading to health problems for the inhabitants, and causes the environmental scourge we know today. LÄS MER

  3. 3. Deep Learning-Based Identification of Ischemic Regions in Native Head CT Scans

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Maximilian Hornung; [2020]
    Nyckelord :;

    Sammanfattning : Stroke is one of the major causes of death and disability worldwide. Fast diagnosis is of critical importance for stroke treatment. In clinical routine, a non-contrast CT (NCCT) is typically acquired immediately to determine whether the stroke is ischemic or hemorrhagic and plan therapy accordingly. LÄS MER

  4. 4. Multi-Architecture Binary Rewriter to Prevent ROP Arbitrary Code Execution

    Uppsats för yrkesexamina på avancerad nivå, KTH/Skolan för datavetenskap och kommunikation (CSC)

    Författare :Matteo Piano; [2017]
    Nyckelord :software security operating system linux binary instrumentation return oriented programming;

    Sammanfattning : Despite the increasing attention to the topic of computer security, the amount of vulnerable software services is still high. The exploitation of a common vulnerability like memory management bugs brought to the development of an attack known as Return Oriented Programming (ROP). LÄS MER

  5. 5. Rumslig fördelning av grov gammal tall i Uppsala stad med tallticka som indikator på höga naturvärden

    L3-uppsats, SLU/Dept. of Ecology

    Författare :Elin Hultman; [2009]
    Nyckelord :tall; Phellinus pini; tallticka; Pinus silvestris; rumslig fördelning; naturvärden;

    Sammanfattning : Fragmentation and reduction of forest area is a threat for many forest species and their habitat. Deficiencies in forest quality, such as lack of dead wood and old trees, are one explanation of the threat. LÄS MER