data execution prevention (dep)
Data Execution Prevention (DEP) is a security feature that helps prevent malicious code or malware from running on a computer. It achieves this by enforcing restrictions on portions of memory and blocking execution of any code that tries to operate from specific areas, safeguarding the system against exploits and enhancing its overall security.
Requires login.
Related Concepts (23)
- address space layout randomization (aslr)
- buffer overflow
- buffer overflows
- code injection
- control flow integrity (cfi)
- dep bypass techniques
- dep compatibility exceptions
- dep configuration options
- dep for specific programs
- dep support in different operating systems
- exploit mitigation techniques
- hardware-enforced dep
- malware prevention
- memory corruption mitigation techniques
- memory corruption prevention
- return-to-libc attacks
- reverse engineering techniques for buffer overflows
- software-enforced dep
- stack smashing
- stack smashing protection (ssp)
- stack smashing protection bypass
- techniques to mitigate buffer overflow attacks
- windows security center dep settings
Similar Concepts
- bypassing dep (data execution prevention)
- code execution
- code injection prevention
- data execution prevention
- data execution prevention (dep) bypass
- data execution prevention (dep) bypass techniques
- data loss prevention
- data protection
- data-oriented programming (dop)
- debugging prevention
- decompilation prevention
- dep (data execution prevention)
- intrusion detection and prevention systems (idps)
- program crash prevention
- sql injection prevention