مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

1,279
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

AUTOMATED EXPLOIT GENERATION FOR APPLICATION’S VULNERABILITY

Pages

  35-50

Abstract

 Existence of a VULNERABILITY for hackers don’t be EXPLOITable only and whatever give credit to VULNERABILITY is EXPLOIT. Automated EXPLOIT Generation (AEG) confront problems because of various protections, behavior and VULNERABILITY conditions but nonetheless had did researches in subject. Whatever I had peruse in this thesis is possibility of automated EXPLOIT generation for vulnerabilities of Internet Explorer (IE) 7 & 8 in Win XP and Win 7. Generated EXPLOITs are for two VULNERABILITY type: STACK BUFFER OVERFLOW and Function Pointer Overwrite. In my savory method that use from instrumentation tools, would hoarded necessary information from program through dynamic analysis. In this method has detected VULNERABILITY type and has bypassed methods of protections and has showing proper patterns for EXPLOIT. Must I reminisce you that in the project don’t discovery VULNERABILITY and there are VULNERABILITY.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    PARSA, S., & ZEINIPOUR, M.. (2016). AUTOMATED EXPLOIT GENERATION FOR APPLICATION’S VULNERABILITY. JOURNAL OF ELECTRONIC AND CYBER DEFENCE, 4(1 (13)), 35-50. SID. https://sid.ir/paper/243239/en

    Vancouver: Copy

    PARSA S., ZEINIPOUR M.. AUTOMATED EXPLOIT GENERATION FOR APPLICATION’S VULNERABILITY. JOURNAL OF ELECTRONIC AND CYBER DEFENCE[Internet]. 2016;4(1 (13)):35-50. Available from: https://sid.ir/paper/243239/en

    IEEE: Copy

    S. PARSA, and M. ZEINIPOUR, “AUTOMATED EXPLOIT GENERATION FOR APPLICATION’S VULNERABILITY,” JOURNAL OF ELECTRONIC AND CYBER DEFENCE, vol. 4, no. 1 (13), pp. 35–50, 2016, [Online]. Available: https://sid.ir/paper/243239/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top