Informative Information for the Uninformed
Current
v9
v8
v7
v6
v5
v4
v3
v2
v1
All
About
Vol 4
»
2006.Jun
Next:
Foreword
Up:
Exploiting the Otherwise Unexploitable
Previous:
Exploiting the Otherwise Unexploitable
Contents
Foreword
Introduction
Understanding Unhandled Exception Filters
Setting the Top-Level UEF
Handling Unhandled Exceptions
Uses for Unhandled Exception Filters
Gaining Control of the Unhandled Exception Filter
Case Study: Internet Explorer
Mitigation Techniques
Behavioral Change to SetUnhandledExceptionFilter
Prevent Setting of non-image UEF
Prevent Execution of non-image UEF
Future Research
Conclusion
Bibliography