Revision 1 as of 2016-05-30 09:54:27

Clear message
Locked History Actions

Related Publications

Obfuscation

Model of attacker

In the case of cyber attacks

  • Attacker can run programs on the same machine
  • Attacker interacts with remote machine
    • buffer overflow, canari, ASLR, CFI