Attacking a problem from the middle: technical perspective
Abstract
Index Terms
- Attacking a problem from the middle: technical perspective
Recommendations
Attacking dynamic code
The Continuing Arms RaceTypically, code-reuse attacks exhibit unique characteristics in the control flow (and the data flow) that allow for generic protections, regardless of the language an application was programmed in. For example, if one can afford to monitor all return ...
Off-path attacking the web
WOOT'12: Proceedings of the 6th USENIX conference on Offensive TechnologiesWe show how an off-path (spoofing-only) attacker can perform cross-site scripting (XSS), cross-site request forgery (CSRF) and site spoofing/defacement attacks, without requiring vulnerabilities in either web-browser or server, and circumventing known ...
Comments
Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Short-paper
- Research
- Refereed
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 4,802Total Downloads
- Downloads (Last 12 months)218
- Downloads (Last 6 weeks)13
Other Metrics
Citations
View Options
View options
View or Download as a PDF file.
PDFChinese translationeReader
View online with eReader.
eReaderDigital Edition
View this article in digital edition.
Digital EditionMagazine Site
View this article on the magazine site (external)
Magazine SiteGet Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in