Showing Articles About
code injection
code injection
Finlay Richardson We describe a new USB co-installer vulnerability, allowing elevation of privileges on Windows systems. This post describes previous co-installer vulnerabilities, and our research methodology, and why peripherals can be a novel source of vulnerabilities in operating systems.
This article explores the security risks associated with dynamic code loading through reflection in programming languages. It discusses methods to secure reflective code loading, including techniques like hashing, code signing, and file permissions to prevent unauthorized code execution and potential privilege escalation vulnerabilities.