
上QQ阅读APP看书,第一时间看更新
Data Execution Prevention (DEP)
DEP is an exploit mitigation technique mechanism through which a processor can distinguish the portions of memory that are executable code from data. For example, in a code injection attack, an attacker tries to inject a vector and execute it. But DEP prevents this because it recognizes the injected part as data and not code.