vZs0wCzLk1F0C75RLZN3

Exploiting Memory Analysis - Francisco G. T. Ribeiro

  • 0
  • 0

From the current offensive and defensive technique arsenal, memory analysis applied to volatile memory is far from being the most explored channel. It is more likely to hear about input validation attacks or attacks against the protocol & cryptography (or even Zombies!) while keys, pass-phrases, credit card numbers and other precious artifacts are kept unsafely in memory.

02 Feb 2015

19 Visualizações

codebits, codebits2012

Estatísticas do vídeo

Mostrar:

Comentários

Vídeos em Destaque