Reversing Binaries for Identification of Vulnerabilities

  • Abhishek Singh
Part of the Advances in Information Security book series (ADIS, volume 44)

This chapter discusses various vulnerabilities in an application. By using case studies of real exploits it discusses the exploitation of vulnerabilities. The chapter also discusses the identification of these vulnerabilities by analyzing assembly code.


Return Address Exception Handler Buffer Overflow Assembly Code Format String 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag US 2009

Authors and Affiliations

  1. 1.Microsoft CorporationRedmondUSA

Personalised recommendations