Login / Signup

Exploitation of Thick Client Application Vulnerabilities and a Synopsis of Mitigation: *How to Conduct Attacks to Abuse Weaknesses Present in a Windows Executable File.

Jean Rosemond DoraLadislav Hluchý
Published in: SACI (2024)
Keyphrases
  • countermeasures
  • security vulnerabilities
  • data sets
  • data streams
  • data model
  • operating system
  • security threats
  • security risks
  • buffer overflow