Fending off Hackers
How modern binaries protect against attacks and how these protections are bypassed
There are three main techniques used to mitigate binary exploitation in modern programs: Data Execution Prevention (DEP), Address Space Layout Randomization (ASLR) and Stack Canaries.
Together, these techniques make exploitation much more difficult for attackers when…