ABSTRACT
Computer attackers use exploit code, little snippets of software, to compromise systems. These exploits,
known informally as sploits, allow an attacker to undermine a vulnerable program by launching them at a
target machine. Inside of a vulnerable program, a sploit can give the attacker complete control of the
target machine. The world of sploits has recently experienced major developments and software releases
that have really honed the attackers’ game. In this chapter, we will analyze some of the building blocks
underlying these evolutionary changes so we can better understand the magnitude of the threat.