Myvideo

Guest

Login

2. Control Hijacking Attacks

Uploaded By: Myvideo
9 views
0
0 votes
0

MIT Computer Systems Security, Fall 2014 View the complete course: Instructor: James Mickens In this lecture, Professor Mickens continues the topic of buffer overflows, discussing approaches to such control hijacking attacks. License: Creative Commons BY-NC-SA More information at More courses at

Share with your friends

Link:

Embed:

Video Size:

Custom size:

x

Add to Playlist:

Favorites
My Playlist
Watch Later