Stru?ný komentá? k tomuto materiálu je na stránce
Mitigating software vulnerabilities. Dokument má 26 stran, z jeho obsahu:
- The economics of exploitation
- Exploit mitigation technology overview
- Tactics
- Enforce invariants - Create artificial diversity, Leverage knowledge deficits, Technologies, Stack buffer overrun detection, Data Execution Prevention (DEP), Address Space Layout Randomization (ASLR), SAFESEH and Structured Exception Handler Overwrite Protection (SEHOP), Heap metadata protection, Enhanced Mitigation Experience Toolkit (EMET), Availability of Mitigation Technologies
- Call to action (Software vendors, Enterprise IT departments, Home and business users)