Address space layout randomization

Results: 175



#Item
1

ASLR: How Robust is the Randomness? Jonathan Ganz What is Address Space Layout Randomization? ● Provides System-Level Control-Flow Integrity

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2017-09-25 15:39:32
    2Computing / Computer security / Software bugs / Address space layout randomization / Gadget / Buffer overflow / Return-to-libc attack / Shellcode / Instruction selection / Position-independent code / NOP / Return-oriented programming

    Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

    Add to Reading List

    Source URL: users.ece.cmu.edu

    Language: English - Date: 2014-05-29 15:38:01
    3Computing / Software / Computer architecture / Android / Smartphones / Alphabet Inc. / ShmooCon / Dalvik / Address space layout randomization

    TEAM JOCH vs. Android: The Ultimate Showdown TEAM JOCH vs. Android - ShmooCon 2011

    Add to Reading List

    Source URL: jon.oberheide.org

    Language: English - Date: 2015-10-11 18:23:35
    4Software / Computing / Computer architecture / Computing platforms / Monolithic kernels / Kernel / Linux kernel / Address space layout randomization / Linux / Android / User space

    Anatomy of a Remote Kernel Exploit Dan Rosenberg Copyright © 2011 Virtual Security Research, LLC.

    Add to Reading List

    Source URL: vulnfactory.org

    Language: English - Date: 2012-01-16 13:38:49
    5Software / System software / Computing / Message transfer agents / Internet Standards / IBM software / Postfix / Ntpd / Privilege separation / Sandbox / POSIX / Address space layout randomization

    Privilege Separation and Pledge Main maid DNS maid - Theo de Raadt

    Add to Reading List

    Source URL: www.openbsd.org

    Language: English - Date: 2016-04-23 06:34:05
    6Computer security / Computing / Cyberwarfare / Software bugs / Computer errors / Shellcode / Buffer overflow / Return-oriented programming / Heap overflow / Address space layout randomization / Symbolic execution / Exploit

    doi:The idea is to identify security-critical software bugs so they can be fixed first. By Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumle

    Add to Reading List

    Source URL: users.ece.cmu.edu

    Language: English - Date: 2014-05-29 15:38:01
    7Computing / Software engineering / Software bugs / Computer programming / Computer memory / C standard library / Address space layout randomization / Buffer overflow / Heap overflow / C dynamic memory allocation / Pointer / Memory safety

    Data Randomization Cristian Cadar Microsoft Research Cambridge, UK

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2016-03-08 07:04:45
    8Software testing / Address space layout randomization / Computer network security / Binary hardening / Code injection / SQL injection / Heap / Vulnerability / GrammaTech / Computer security

    REPORT DOCUMENTATION PAGE

    Add to Reading List

    Source URL: samate.nist.gov

    Language: English - Date: 2015-10-27 14:35:32
    9Monolithic kernels / Kernel / Linux kernel / Linux / Rooting / Address space layout randomization / User space

    Owned Over Amateur Radio Remote Kernel Exploitation inDan Rosenberg

    Add to Reading List

    Source URL: vulnfactory.org

    Language: English - Date: 2011-08-07 15:49:03
    10Cybercrime / E-commerce / Cyberwarfare / Computer network security / Address space layout randomization / Return-oriented programming / PaX / Computer security / Exploit / Timing attack / Side-channel attack / Phishing

    Moving Target Techniques: Leveraging Uncertainty for Cyber Defense Hamed Okhravi, William W. Streilein, and Kevin S. Bauer Cyber moving target techniques involve

    Add to Reading List

    Source URL: www.ll.mit.edu

    Language: English - Date: 2016-07-12 15:04:32
    UPDATE