Login / Signup
Exploitation of Thick Client Application Vulnerabilities and a Synopsis of Mitigation: *How to Conduct Attacks to Abuse Weaknesses Present in a Windows Executable File.
Jean Rosemond Dora
Ladislav Hluchý
Published in:
SACI (2024)
Keyphrases
</>
countermeasures
security vulnerabilities
data sets
data streams
data model
operating system
security threats
security risks
buffer overflow