Informative Information for the Uninformed
Current
v9
v8
v7
v6
v5
v4
v3
v2
v1
All
About
Vol 4
»
2006.Jun
Next:
Contents
Contents
Exploiting the Otherwise Non-exploitable on Windows
Taking Another Stab at the Unhandled Exception Filter
May 2006
Contents
Foreword
Introduction
Understanding Unhandled Exception Filters
Setting the Top-Level UEF
Handling Unhandled Exceptions
Uses for Unhandled Exception Filters
Gaining Control of the Unhandled Exception Filter
Case Study: Internet Explorer
Mitigation Techniques
Behavioral Change to SetUnhandledExceptionFilter
Prevent Setting of non-image UEF
Prevent Execution of non-image UEF
Future Research
Conclusion
Bibliography
About this document ...