Address space layout randomization

Results: 175



#Item
21Let your Mach-O fly Vincenzo Iozzo

Let your Mach-O fly Vincenzo Iozzo

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:17
22Let your Mach-O fly Vincenzo Iozzo  January 15, 2009 Abstract Mac OS X is starting to spread among users, so new exploitation

Let your Mach-O fly Vincenzo Iozzo January 15, 2009 Abstract Mac OS X is starting to spread among users, so new exploitation

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:17
23Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2016-01-02 20:09:14
24Attacker “Math” 101 Professor Dai Zovi Institute for the Advancement of Memory Corruption  What is this all

Attacker “Math” 101 Professor Dai Zovi Institute for the Advancement of Memory Corruption What is this all

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:17
25Framing Signals—A Return to Portable Shellcode Erik Bosman Vrije Universiteit Amsterdam

Framing Signals—A Return to Portable Shellcode Erik Bosman Vrije Universiteit Amsterdam

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2014-03-24 10:31:12
262013 IEEE Symposium on Security and Privacy  Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

2013 IEEE Symposium on Security and Privacy Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

Add to Reading List

Source URL: wwwx.cs.unc.edu

Language: English - Date: 2014-09-05 15:38:44
27Program Differentiation-INTERACT-2010-v6-publish

Program Differentiation-INTERACT-2010-v6-publish

Add to Reading List

Source URL: www.cs.fsu.edu

Language: English - Date: 2010-02-17 09:21:07
282013 IEEE Symposium on Security and Privacy  Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

2013 IEEE Symposium on Security and Privacy Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2013-04-05 19:56:58
    29Out Of Control: Overcoming Control-Flow Integrity Enes Gökta¸s∗ Elias Athanasopoulos†  Vrije Universiteit

    Out Of Control: Overcoming Control-Flow Integrity Enes Gökta¸s∗ Elias Athanasopoulos† Vrije Universiteit

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2014-04-21 13:48:10
    30The Danger of Unrandomized Code EDWAR D J . SCHWART Z Of Headless User Accounts and Restricted Shells JAN SCHAUMANN

    The Danger of Unrandomized Code EDWAR D J . SCHWART Z Of Headless User Accounts and Restricted Shells JAN SCHAUMANN

    Add to Reading List

    Source URL: www.usenix.org

    Language: English