This resource is no longer available

Cover Image

Defeating memory corruption attacks by program diversification and process replication

By Marc Nimmerrichter and Lorenzo Cavallaro

Lack of diversity in software and operating systems over many years has left a large number of computers vulnerable to memory program attacks.

Most PCs are shipped with similar components using the same instruction set; operating systems provide the same system calls and a similar address space layout for all running programs; and the programs themselves are compiled only once for the hundreds of thousands of systems on which they are run.

This allows an attacker to use the same piece of malicious code to infect a huge number of computers.

A diversified and replicated execution system promises to provide effective countermeasures.

Vendor:
TechTarget ComputerWeekly.com
Posted:
Feb 8, 2021
Published:
Jul 22, 2014
Format:
PDF
Type:
Essential Guide

This resource is no longer available.