2011
DOI: 10.4135/9781526461322
|View full text |Cite
|
Sign up to set email alerts
|

LG in India (A): Entry Into an Emerging Economy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…For this exploiting technique, small code snippets called gadgets are combined by the attacker to build the shellcode. Since an attacker needs a variety of different ROP gadgets to obtain the shellcode she needs, we measured the reduction of gadgets in the library with the tool ROPgadget [32] in version 5.6. While a tailored software stack alone does not prevent code-reuse attacks, this metric gives an estimate on the limitation an applicationspecific software stack imposes on ROP attacks.…”
Section: A Librariesmentioning
confidence: 99%
“…For this exploiting technique, small code snippets called gadgets are combined by the attacker to build the shellcode. Since an attacker needs a variety of different ROP gadgets to obtain the shellcode she needs, we measured the reduction of gadgets in the library with the tool ROPgadget [32] in version 5.6. While a tailored software stack alone does not prevent code-reuse attacks, this metric gives an estimate on the limitation an applicationspecific software stack imposes on ROP attacks.…”
Section: A Librariesmentioning
confidence: 99%