Exploiting Memory Analysis - Francisco G. T. Ribeiro
From the current offensive and defensive technique arsenal, memory analysis applied to volatile memory is far from being the most explored channel. It is more likely to hear about input validation attacks or attacks against the protocol & cryptography (or even Zombies!) while keys, pass-phrases, credit card numbers and other precious artifacts are kept unsafely in memory.
02 Feb 2015



Comentários