null Global Committee elections are coming up! See the election repository for more information.

Abstract

We would be skimming through many other binary exploitation techniques and their mitigation techniques employed before Return oriented Programming. The other exploitation techniques would involve -
Return Stack Pointer
SEH Overwrite

Mitigation techniques would involve -

Stack cookie prevention
NX
DEP

We would then be looking at the exploitation technique and mitigation for -
ROP
If time permits, we would also be looking at a DEMO and live exploitation of the stack using Return Oriented Programming

This is another link to the reference for the Presentation
https://www.slideshare.net/MihirShah247/rop-123230720

Speaker

Mihir Shah

Timing

Starts at Saturday November 17 2018, 01:25 PM. The sessions runs for 40 minutes.

Resources