Abstract: Many attacks rely on the ability of an adversary to manipulate the normal, expected flow of the legitimate software executing on a platform. This talk will summarize the mitigations NSA is developing with industry to address this attack vector at a fundamental level and in a way that is largely invisible to the end user and administrator.
Date Published: 21 November 2016
Last Reviewed: 20 October 2016
Dissemination Control: N/A
Length: 33 page(s)