Thwarting Exploits with DEP
Thwarting malware attacks that exploit software vulnerabilities is the most important element of automatic updates. But Windows 8 offers a second way of thwarting such attacks. It’s called Data Execution Prevention (DEP). You don’t want to use DEP as an alternative to other techniques described in this part of the book. Rather, you want to use it in addition to other techniques.
Many malware attacks use a technique called buffer overflow (or buffer overrun) to sneak code (program instructions) into areas of memory that only the operating system (Windows) should be using. Those areas of memory have direct access to everything on your computer. So any bad code that sneaks into that area can do great damage.
Data Execution Prevention is a security antidote to such attacks. It monitors programs to make sure they use only safe and appropriate memory locations. If DEP notices a program trying to do anything sneaky, ...
Get Windows 8 Bible now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.