Address space layout randomization

Results: 175



#Item
11Exploitation techniques for NT kernel Adrien ‘Adr1’ Garin Introduction

Exploitation techniques for NT kernel Adrien ‘Adr1’ Garin Introduction

Add to Reading List

Source URL: www.lse.epita.fr

Language: English - Date: 2016-08-09 05:04:08
12String Oriented Programming Circumventing ASLR, DEP, and Other Guards Mathias Payer  ETH Zurich, Switzerland

String Oriented Programming Circumventing ASLR, DEP, and Other Guards Mathias Payer ETH Zurich, Switzerland

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
13String Oriented Programming: When ASLR is not Enough Mathias Payer Thomas R. Gross  Department of Computer Science

String Oriented Programming: When ASLR is not Enough Mathias Payer Thomas R. Gross Department of Computer Science

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
14CAIN: Silently Breaking ASLR in the Cloud Antonio Barresi ETH Zurich Kaveh Razavi VU University Amsterdam

CAIN: Silently Breaking ASLR in the Cloud Antonio Barresi ETH Zurich Kaveh Razavi VU University Amsterdam

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
15String Oriented Programming  Circumventing ASLR, DEP, and other Guards Mathias Payer, ETH Zürich

String Oriented Programming Circumventing ASLR, DEP, and other Guards Mathias Payer, ETH Zürich

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
16String Oriented Programming: When ASLR is not enough Mathias Payer* and Thomas R. Gross Department of Computer Science ETH Zürich, Switzerland

String Oriented Programming: When ASLR is not enough Mathias Payer* and Thomas R. Gross Department of Computer Science ETH Zürich, Switzerland

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
17Too much PIE is bad for performance Mathias  Department of Computer Science, ETH Zurich Abstract Compiling an application as a Position Independent Executable (PIE) enables Address Space L

Too much PIE is bad for performance Mathias Department of Computer Science, ETH Zurich Abstract Compiling an application as a Position Independent Executable (PIE) enables Address Space L

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
18SoK: Eternal War in Memory L´aszl´o Szekeres† , Mathias Payer‡ , Tao Wei∗‡ , Dawn Song‡ † Stony Brook University ‡ University of California, Berkeley ∗ Peking University

SoK: Eternal War in Memory L´aszl´o Szekeres† , Mathias Payer‡ , Tao Wei∗‡ , Dawn Song‡ † Stony Brook University ‡ University of California, Berkeley ∗ Peking University

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
19​Attacking Interoperability: ​An OLE Edition • •  Haifei Li ()

​Attacking Interoperability: ​An OLE Edition • • Haifei Li ()

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-08-17 13:19:15
20Curriculum Vitae Name: Current: Studies:  Address:

Curriculum Vitae Name: Current: Studies: Address:

Add to Reading List

Source URL: hmarco.org

Language: English - Date: 2016-04-07 10:01:31