Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced exploitation techniques in this conference talk from Ekoparty 2010, focusing on Return-Oriented Programming (ROP). Delve into the intricacies of ROP, a powerful method used to bypass security mechanisms like Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR). Learn how attackers can construct malicious payloads by chaining together existing code fragments, and understand the implications for software security. Gain insights into defensive strategies and best practices to mitigate ROP-based attacks in your own applications.