non-executable stack protection
Non-executable stack protection is a security feature designed to prevent the execution of code stored in the stack memory of a computer program, making it more difficult for attackers to exploit stack-based vulnerabilities.
Requires login.
Related Concepts (20)
- address space layout randomization (aslr)
- binary exploitation
- buffer overflow
- buffer overflow protection
- canary value
- code injection attacks
- control flow hijacking
- control flow integrity (cfi)
- data execution prevention
- format string vulnerabilities
- memory safety
- return-oriented programming (rop)
- return-oriented programming (rop) attacks
- stack buffer overflow
- stack canaries
- stack guard
- stack pivoting
- stack protection mechanisms
- stack smashing protection
- stack-based attacks
Similar Concepts
- call stack manipulation
- code protection
- debugging protection
- defense mechanisms against stack-based buffer overflow
- kernel-level protection
- non-executable stack
- non-executable stack (nx)
- shadow stack
- stack frame obfuscation
- stack smashing protection (ssp)
- stack smashing protection bypass
- stack smashing protection mechanisms
- stack-based buffer overflow
- stack-based buffer overflows
- stack-based memory corruption