This presentation goes through different techniques for exploiting and mitigating various buffer overflow vulnerabilities found in programsLire moins