Here we consider common methods that exploit vulnerabilities in (typically non-security) software programs, through abuse of features in programming languages, system architectures, and supporting functionality.
CITATION STYLE
van Oorschot, P. C. (2021). Software Security—Exploits and Privilege Escalation. In Information Security and Cryptography (pp. 155–182). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-83411-1_6
Mendeley helps you to discover research relevant for your work.