Experimental Security Analysis of a Modern Automobile

Experimental Security Analysis of a Modern Automobile - Foster et al . 2010 Today's paper gives us a frightening insight into the (lack of) security of the distributed computing systems controlling modern cars. The results described were obtained from testing a 2009 model year car. Surely today's cars are better than this? In the UK, … Continue reading Experimental Security Analysis of a Modern Automobile

The geometry of innocent flesh on the bone: Return-into-libc without function calls (on x86)

The geometry of innocent flesh on the bone: Return-into-libc without function calls (on x86) - Shacham 2007 Yesterday we saw that Data Execution Prevention W⊕X is one of the widely deployed defenses against code corruption attacks. Today's paper teaches us why that defense isn't as useful as it first appears! We present new techniques that … Continue reading The geometry of innocent flesh on the bone: Return-into-libc without function calls (on x86)