ABSTRACT

Computer attackers use exploit code, little snippets of software, to compromise systems. These exploits,

known informally as sploits, allow an attacker to undermine a vulnerable program by launching them at a

target machine. Inside of a vulnerable program, a sploit can give the attacker complete control of the

target machine. The world of sploits has recently experienced major developments and software releases

that have really honed the attackers’ game. In this chapter, we will analyze some of the building blocks

underlying these evolutionary changes so we can better understand the magnitude of the threat.