Useful Links
Computer Science
Cybersecurity
Browser Security and Exploitation
1. Introduction to Browser Security
2. Browser Architecture Fundamentals
3. Web Technology Foundations
4. Browser Security Models
5. Vulnerability Classifications
6. Browser Exploitation Methodology
7. Exploitation Primitives and Techniques
8. JavaScript Engine Exploitation
9. DOM and Rendering Engine Exploitation
10. Browser Hardening and Mitigations
11. Vulnerability Research Methods
12. Browser Extensions and Plugin Security
13. Emerging Attack Surfaces
14. Security Analysis Tools
Browser Hardening and Mitigations
Compile-Time Protections
Stack Canaries
Canary Value Generation
Stack Overflow Detection
Bypass Techniques
Fortify Source
Buffer Overflow Detection
Function Call Validation
Control Flow Guard
Indirect Call Protection
Return Address Validation
Runtime Mitigations
Address Space Layout Randomization
Virtual Address Randomization
Heap Layout Randomization
Stack Randomization
Data Execution Prevention
Non-Executable Memory Pages
Hardware NX Bit Support
Software DEP Implementation
Control Flow Integrity
Forward-Edge Protection
Backward-Edge Protection
Virtual Call Protection
Hardware-Assisted Security
Intel CET
Shadow Stack Implementation
Indirect Branch Tracking
ARM Pointer Authentication
Return Address Signing
Function Pointer Protection
Memory Tagging Extensions
Tag-Based Memory Protection
Use-After-Free Detection
Previous
9. DOM and Rendering Engine Exploitation
Go to top
Next
11. Vulnerability Research Methods