Abstract
Here we discuss known methods to exploit common security vulnerabilities in programs. The focus of software security (versus, e.g., security software) is exploitable software implementation errors and design flaws; this may be combined with abuse of a system’s architectural features and functionality.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 The Author(s)
About this chapter
Cite this chapter
van Oorschot, P.C. (2020). Software Security—Exploits and Privilege Escalation. In: Computer Security and the Internet. Information Security and Cryptography. Springer, Cham. https://doi.org/10.1007/978-3-030-33649-3_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-33649-3_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-33648-6
Online ISBN: 978-3-030-33649-3
eBook Packages: Computer ScienceComputer Science (R0)