Address space layout randomization

Results: 175



#Item
111Security / Monoculture / Vulnerability / Malware / Attack / Address space layout randomization / Buffer overflow / Computer network security / Cyberwarfare / Computer security

IT Monoculture The Monoculture Risk Put into Context Conventional wisdom holds that software monocultures are exceptionally vulnerable to malware outbreaks. The

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2009-02-09 20:02:40
112Mac OS X / Mac OS X Snow Leopard / Mac OS X Leopard / Buffer overflow / Address space layout randomization / Macintosh / Time Machine / Mac OS / Safari / Software / Computing / Computer architecture

Magazine of the Apple User Group of Canterbury Inc. Applebyte November[removed]bringing Christmas Greetings

Add to Reading List

Source URL: www.appleusers.co.nz

Language: English - Date: 2014-09-20 23:08:13
113Software bugs / Cross-platform software / Heap spraying / Shellcode / Buffer overflow / Address space layout randomization / NOP slide / JavaScript / Garbage collection / Computing / Cyberwarfare / Computer security

N OZZLE: A Defense Against Heap-spraying Code Injection Attacks Paruj Ratanaworabhan Cornell University Benjamin Livshits

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2009-06-05 22:26:35
114Computer security / Stack buffer overflow / Buffer overflow / Shellcode / Address space layout randomization / Stack / Pointer / PaX / Heap overflow / Software bugs / Computing / Software quality

\x90\x90\x90\x90\x90\x90\x90\x90 Stack Smashing as of Today A State-of-the-Art Overview on Buffer Overflow Protections

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
115Software engineering / Stack buffer overflow / Buffer overflow / Address space layout randomization / PaX / Heap overflow / NX bit / Uncontrolled format string / Stack / Computing / Software bugs / Software quality

Buffer overflows on linux-x86-64 Hagen Fritsch Technische Universit¨at M¨unchen January 22nd, 2009

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
116Mac OS X / Mach / Address space layout randomization / Dynamic linker / Mach-O / Shellcode / Portable Executable / Library / Darwin / Software / Computing / Computer architecture

Fun and Games with Mac OS X and iPhone Payloads Charlie Miller Independent Security Evaluators [removed]

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:30
117Design of experiments / Random number generation / Buffer overflow / Randomization / Computing / Scientific method / Statistics / Randomness / Address space layout randomization / Software bugs

Bypassing ASLR by predicting a process’ randomization Hagen Fritsch January 23nd, 2009

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
118Smartphones / IOS jailbreaking / IOS / Address space layout randomization / Sandbox / SQL injection / IOS version history / System software / Computing / Software

Securing iOS Applications Dr. Bruce Sams, OPTIMAbit GmbH About Me

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-12-16 17:34:42
119Cisco IOS / Routers / Smartphones / IOS / Address space layout randomization / Cisco Systems / Virtual LAN / Password / Computing / Computer architecture / System software

Cisco IOS Risk Mitigation

Add to Reading List

Source URL: cert.europa.eu

Language: English - Date: 2014-10-23 05:30:22
120Data / Copyright law of the United States / Digital rights management / Copyright / Blue Coat Systems / ReD / Address space layout randomization / Dropbox / Software / Computing / Copyright law

[removed]OVERVIEW FROM FOG COMPUTING TO ROP GADGETS

Add to Reading List

Source URL: warsaw2014.honeynet.org

Language: English - Date: 2014-06-11 12:37:34
UPDATE