Security / Abuse of Functionality
Studying how normal functionality available via the existing services might be abused and used to gain access to data, content, algorithms, and backend systems working in the cracks to open up security holes.
Notes: |
Buffer Overflow Attack | ||
Buffer Overflow via Environment Variables | ||
Overflow Binary Resource File |
|
|
|