The Startup
Published in

The Startup

Fending off Hackers

How modern binaries protect against attacks and how these protections are bypassed

Photo by Obinna Valentine on Unsplash

There are three main techniques used to mitigate binary exploitation in modern programs: Data Execution Prevention (DEP), Address Space Layout Randomization (ASLR) and Stack Canaries.

Together, these techniques make exploitation much more difficult for attackers when…




Get smarter at building your thing. Follow to join The Startup’s +8 million monthly readers & +756K followers.

Recommended from Medium

Secure Insights with Brian Krause, Director of Worldwide Channels at Idaptive

Data Protection Regulation

Fighting fraud with technology

{UPDATE} Domino for iPhone Hack Free Resources Generator

Several Ways of Securing Your API Endpoint

Ebebe James Chibueze — How virus damages computer and laptop

📣 CoinWealth (CNW) is Now LIVE on GokuMarket IEO LaunchPad! 🚀

Principles for Good ID in Emerging Markets

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Vickie Li

Vickie Li

Professional investigator of nerdy stuff. Hacks and secures. Creates god awful infographics.

More from Medium

OverTheWire:~$ Bandit Level 8 → 9

Software Reverse Engineering: Diffusing Phase 6

Wolverine Security CTF