Exploitation
The techniques to exploit a buffer overflow vulnerability vary per architecture, operating system and memory region. For example, exploitation on the heap (used for dynamically allocated memory), is very different from exploitation on the call stack.
Read more about this topic: Buffer Overflow
Famous quotes containing the word exploitation:
“Communism is inequality, but not as property is. Property is exploitation of the weak by the strong. Communism is exploitation of the strong by the weak.”
—Pierre-Joseph Proudhon (18091865)
“The mothers battle for her childwith sickness, with poverty, with war, with all the forces of exploitation and callousness that cheapen human lifeneeds to become a common human battle, waged in love and in the passion for survival.”
—Adrienne Rich (20th century)
“The only phenomenon with which writing has always been concomitant is the creation of cities and empires, that is the integration of large numbers of individuals into a political system, and their grading into castes or classes.... It seems to have favored the exploitation of human beings rather than their enlightenment.”
—Claude Lévi-Strauss (b. 1908)