exploit mitigation
nõrkuseleevendus
olemus
meetodite ja vahendite rakendamine
tarkvara nõrkustest tulenevate riskide vähendamiseks
= applying methods and tools to mitigate risks arising from software vulnerabilities
ülevaateid
https://www.compass-security.com/fileadmin/Datein/Research/Praesentationen/beer-talk_linux_exploit_mitigation_03-16_bern_jona.pdf
https://pt.malwarebytes.com/pdf/datasheets/MBAEBDatasheet.pdf
https://owasp.org/www-chapter-belgium/assets/2016/2016-10-18/OWASP_MVEE.pdf
https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-and-management/endpoint-protection/all/Using-policies-to-manage-security/hardening-windows-clients-against-memory-tampering-v123149922-d3859e12879/memory-exploit-mitigation-techniques-v114221375-d53e13441.html
https://www3.cs.stonybrook.edu/~mikepo/papers/kbouncer.sec13.pdf
https://0x434b.dev/an-introduction-to-data-execution-prevention-dep-in-linux/
https://0x434b.dev/an-introduction-to-data-stack-canaries-in-linux/