Exploiting Software How to Break Code

نویسندگان

  • Greg Hoglund
  • Gary McGraw
چکیده

How does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers. Exploiting Software is loaded with examples of real attacks, attack patterns, tools, and techniques used by bad guys to break software. If you want to protect your software from attack, you must first learn how real attacks are really carried out. This must-have book may shock you—and it will certainly educate you.Getting beyond the script kiddie treatment found in many hacking books, you will learn about

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

How Software breaks

Prefaces Software security relates to designing and developing software such that they cannot break in case of any intentional or accidental attack. Security is primary concern for software development projects since their inception. Breaking a software does not necessarily equates “hacking” it, rather it is a phenomenon of exploiting any vulnerabilities in design or implementation of software....

متن کامل

The study of dose gamma rays of 192Ir source on DNA single strand break (SSB) and DNA double strand break (DSB) in soft tissue phantom

Introduction: Passage of ionizing radiation through the organs of living creatures develops clusters of damaged nucleotides inside the DNA rounds. 192Ir Gamma source is one of the most widely used sources in brachytherapy of cervical and prostate cancer. Thus, in this research, we investigated the flux of photons and its resulting secondary electrons, the single-strand break (S...

متن کامل

Dwarf Frankenstein is still in your memory: tiny code reuse attacks

Code reuse attacks such as return oriented programming and jump oriented programming are the most popular exploitation methods among attackers. A large number of practical and non-practical defenses are proposed that differ in their overhead, the source code requirement, detection rate and implementation dependencies. However, a usual aspect among these methods is consideration of the common be...

متن کامل

Parsing Variant C Code: An Evaluation on Automotive Software

Software product lines are often implemented using the C preprocessor. Different features are selected based on macros; the corresponding code is activated or deactivated using #if. Unfortunately, C preprocessor constructs are not parseable in general, since they break the syntactical structure of C code [1]. This imposes a severe limitation on software analyses: They usually cannot be performe...

متن کامل

Software Activation Using Multithreading

Software activation is an anti-piracy technology designed to verify that software products have been legitimately licensed. Activation should be quick and simple while simultaneously being secure and protecting customer privacy. The most common form of software activation is for the user to enter a legitimate product serial number. However, software activation based on serial numbers appears to...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004