10 Years of DLL Hijacking, and What We Can Do to Prevent 10 More
Introduction DLL Hijacking — a technique for forcing legitimate applications to run malicious code — has been in use for about a decade at least. In this write-up we give a short introduction to the technique of DLL Hijacking, followed by a digest of several dozen documented uses of that technique over the past decade […]
The post 10 Years of DLL Hijacking, and What We Can Do to Prevent 10 More appeared first on Check Point Research.