Address space layout randomization

Results: 175



#Item
161Address space layout randomization / Computer file formats / Programming language implementation / Mac OS X / PaX / Return-to-libc attack / Relocation / JIT spraying / Prelink / Software / Computing / System software

Address Space Randomization for Mobile Devices Hristo Bojinov Dan Boneh Rich Cannings

Add to Reading List

Source URL: bojinov.org

Language: English - Date: 2011-03-01 17:48:00
162Software / C Standard Library / Address space layout randomization / PaX / Return-to-libc attack / Stack buffer overflow / Grsecurity / Buffer overflow / Prelink / Computing / Computer security / Software bugs

On the Effectiveness of Address-Space Randomization Hovav Shacham Matthew Page Ben Pfaff

Add to Reading List

Source URL: benpfaff.org

Language: English - Date: 2014-06-05 00:52:52
163Computing / Heap / System software / Memory management / Address space layout randomization / C dynamic memory allocation

iOS 6 Kernel Security: A Hacker’s Guide by Mark Dowd and Tarjei Mandt [removed] [removed]

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-01-19 23:15:46
164Multi-touch / Smartphones / Address space layout randomization / Cisco IOS / Patch / Microsoft Reader / Application security / IOS / Microsoft Windows / Software / Computing / Computer security

Take Advantage of Software Improvements Why Upgrade? Software security countermeasures are reactive in nature and evolve with the attack landscape. As

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2013-11-21 11:30:44
165Antivirus software / Software testing / Malware / Address space layout randomization / Exploit / Vulnerability / Attack / Computer virus / Data Execution Prevention / Computer security / Cyberwarfare / Computer network security

Anti-Exploitation Features Cyber attackers want access to your sensitive information or intellectual property for strategic advantage, or more commonly, for monetary gain. They commonly attempt to exploit vulnerabilitie

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2013-11-21 11:32:47
166Linux / Free software / Vrije Universiteit / Address space layout randomization / Vrije / Amsterdam / Linux kernel / Software / Computing / Andrew S. Tanenbaum

Safe and Automatic Live Update Ph.D. Thesis

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2014-05-16 04:50:19
167Software bugs / Address space layout randomization / PaX / Buffer overflow / Return-oriented programming / Malware / C / Stack / Pointer / Computing / Computer programming / Software engineering

Systematic Analysis of Defenses Against Return-Oriented Programming ⋆ R. Skowyra, K. Casteel, H. Okhravi, N. Zeldovich, and W. Streilein

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2013-11-07 19:23:18
168IPhone / IOS / Address space layout randomization / Mobile application development / GNU Debugger / Mobile apps / Computing / Smartphones / Software

Whitepaper iOS Application (In)Security

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2012-05-04 03:51:33
169C Standard Library / Windows NT / C dynamic memory allocation / Heap overflow / Windows Vista / Data segment / Heap / Stack / Pointer / Computing / Memory management / Address space layout randomization

Vl_distribution

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2007-02-26 02:48:28
170Windows XP / Windows NT / Windows Server / Kernel Patch Protection / Windows Defender / Windows / Data Execution Prevention / Mandatory Integrity Control / Address space layout randomization / Microsoft Windows / Software / Windows Vista

PDF Document

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2007-02-27 20:18:42
UPDATE