The post was authored by Mariano Graziano. Executive Summary Attacks have grown more and more complex over the years. The evolution of the threat landscape has demonstrated this where adversaries have had to modify their tactics to bypass mitigations and compromise systems in response to better mitigations. Code-reuse attacks, such as return-oriented programming (ROP), are […]
from Cisco Blog » Security http://ift.tt/1sMcjSV
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.