Attack Question

Discussion in 'Computer Security' started by Seong Oun Hwang, Feb 17, 2005.

  1. Is anyone aware of attacks that depend on knowing some information about the
    control flow of
    program execution? I'd like to get the (real) examples of these kinds of
    attacks.

    I'd appreciate any information (hints, references, etc.) related to this.
    Seong Oun Hwang, Feb 17, 2005
    #1
    1. Advertising

  2. Seong Oun Hwang

    winged Guest

    Seong Oun Hwang wrote:
    > Is anyone aware of attacks that depend on knowing some information about the
    > control flow of
    > program execution? I'd like to get the (real) examples of these kinds of
    > attacks.
    >
    > I'd appreciate any information (hints, references, etc.) related to this.
    >
    >
    >

    You might find this useful.

    http://csg.lcs.mit.edu/pubs/memos/Memo-467/memo467.pdf

    Winged
    winged, Feb 17, 2005
    #2
    1. Advertising

Want to reply to this thread or ask your own question?

It takes just 2 minutes to sign up (and it's free!). Just click the sign up button to choose a username and then you can ask your own questions on the forum.
Similar Threads
  1. Tim J. Dunn
    Replies:
    2
    Views:
    875
    reshman
    Nov 5, 2003
  2. SingSong

    DOS Attack

    SingSong, Dec 12, 2003, in forum: Cisco
    Replies:
    3
    Views:
    667
    Bob by The Bay
    Dec 13, 2003
  3. yellow submarine

    question about a blocked attack including other's IP address

    yellow submarine, Sep 30, 2003, in forum: Computer Support
    Replies:
    14
    Views:
    920
    yellow submarine
    Oct 1, 2003
  4. dorothy.bradbury
    Replies:
    15
    Views:
    992
    dorothy.bradbury
    Jul 21, 2003
  5. =?ISO-8859-1?Q?R=F4g=EAr?=

    Question about virus attack

    =?ISO-8859-1?Q?R=F4g=EAr?=, Jun 21, 2006, in forum: Computer Support
    Replies:
    14
    Views:
    581
    Plato
    Jun 22, 2006
Loading...

Share This Page