Address space layout randomization

Results: 175



#Item
101Hacking / Software testing / Vulnerability / Exploit / Address space layout randomization / Zero / Computer security / Cyberwarfare / Failure

Taming wild copies From hopeless crash to working exploit Taming wild copies From hopeless crash to working

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2015-03-27 04:19:46
102JIT spraying / Heap spraying / Shellcode / Cross-platform software / Address space layout randomization / Self-modifying code / Just-in-time compilation / NOP / JavaScript engine / Software / Computing / System software

Microsoft Word - pp44s-wei31-1.doc

Add to Reading List

Source URL: lenx.100871.net

Language: English - Date: 2012-05-09 22:15:56
103Computer programming / Pointer / Dangling pointer / Stack buffer overflow / Memory safety / Address space layout randomization / Buffer overflow / C / Memory corruption / Computing / Software engineering / Software bugs

SoK: Eternal War in Memory L´aszl´o Szekeres† , Mathias Payer‡ , Tao Wei∗‡ , Dawn Song‡ † Stony Brook University ‡ University of California, Berkeley ∗ Peking University

Add to Reading List

Source URL: lenx.100871.net

Language: English - Date: 2013-03-11 18:00:21
104Address space layout randomization / Hypervisor / Xen / Architecture of Windows NT / Hyper-V / Ring / Rootkit / System software / Software / Windows Server

POACHER TURNED GATEKEEPER: LESSONS LEARNED FROM EIGHT YEARS OF BREAKING HYPERVISORS Rafal Wojtczuk <> Agenda

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:03
105Software bugs / Address space layout randomization / Malware / Pointer / Vulnerability / Duqu / Pwn2Own / Heap overflow / Stack buffer overflow / Computer security / Computing / Cyberwarfare

Ken  Johnson,  Ma,  Miller   Microso1  Security  Engineering  Center  (MSEC)       Black  Hat  USA  2012    

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-08-13 16:23:01
106Heap feng shui / Address space layout randomization / C dynamic memory allocation / Heap / Feng shui / Pointer / Pwn2Own / D-ary heap / New / Computing / Computer programming / Software engineering

The Art of Leaks: The Return of Heap Feng Shui Ga1ois @NSFOCUS Security Labs Agenda

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2014-03-19 04:38:32
107C Standard Library / Return-to-libc attack / Address space layout randomization / Buffer overflow / Software engineering / GADGET / MOV / Shellcode / NX bit / Computing / Software bugs / Computer architecture

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-12-17 15:18:11
108Software bugs / Computer errors / Stack buffer overflow / Return-to-libc attack / Address space layout randomization / PaX / Buffer overflow / OpenBSD / Stack / Computing / Software engineering / Computer programming

Protecting Against Address Space Layout Randomization (ASLR) Compromises and Return-to-Libc Attacks Using Network Intrusion Detection Systems DAY, David and ZHAO, Zhengxu Available from Sheffield Hallam University Resear

Add to Reading List

Source URL: shura.shu.ac.uk

Language: English - Date: 2013-08-02 00:42:29
109IOS / ITunes / Smartphones / Mach / Multi-touch / Address space layout randomization / Xcode / Apple Developer / App Store / Software / Computing / Apple Inc.

Trail of Bits Apple iOS 4 Security Evaluation Dino A. Dai Zovi Principal Trail of Bits LLC

Add to Reading List

Source URL: trailofbits.files.wordpress.com

Language: English - Date: 2011-08-15 15:38:23
110XNU / Address space layout randomization / Virtual memory / Computer architecture / Mach / Mac OS X

Let your Mach-O fly Vincenzo Iozzo [removed] 2/18/09

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:23
UPDATE