Voting machines must remain secure throughout their entire service lifetime, and this study demonstrates how a relatively new programming technique can be used to take control of a voting machine that ...
Intel has come up with a chip-level plan to defeat attacks that use return-oriented programming to exploit memory vulnerabilities. The new measures are outlined in a preview specification from Intel ...
As Microsoft hardens its defenses with tools such as Control Flow Guard, researchers at Endgame are preparing for the reality of Counterfeit Object-Oriented Programming attacks to move from ...
UC San Diego computer science Ph.D. student Stephen Checkoway clutches a print out demonstrating that his vote-stealing exploit that relied on return-oriented programming successfully took control of ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results