Address space layout randomization

Results: 175



#Item
31SoK: Automated Software Diversity Per Larsen, Andrei Homescu, Stefan Brunthaler, Michael Franz University of California, Irvine Abstract—The idea of automatic software diversity is at least two decades old. The defici

SoK: Automated Software Diversity Per Larsen, Andrei Homescu, Stefan Brunthaler, Michael Franz University of California, Irvine Abstract—The idea of automatic software diversity is at least two decades old. The defici

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-04-21 13:48:10
32Katana: Towards Patching as a Runtime part of the Compiler-Linker-Loader Toolchain Sergey Bratus, James Oakley, Ashwin Ramaswamy, Sean W. Smith1 Computer Science Dept. Dartmouth College Hanover, New Hampshire

Katana: Towards Patching as a Runtime part of the Compiler-Linker-Loader Toolchain Sergey Bratus, James Oakley, Ashwin Ramaswamy, Sean W. Smith1 Computer Science Dept. Dartmouth College Hanover, New Hampshire

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2011-07-11 16:41:08
33   Brad Spengler / grsecurity

  Brad Spengler / grsecurity

Add to Reading List

Source URL: grsecurity.net

Language: English - Date: 2010-07-31 12:32:40
34Code Injection Attacks on Harvard-Architecture Devices Aurélien Francillon Claude Castelluccia  INRIA Rhône-Alpes

Code Injection Attacks on Harvard-Architecture Devices Aurélien Francillon Claude Castelluccia INRIA Rhône-Alpes

Add to Reading List

Source URL: planete.inrialpes.fr

Language: English - Date: 2008-09-11 06:46:35
35(un) Smashing the Stack: 66ee66dd66bb 33aa6e

(un) Smashing the Stack: 66ee66dd66bb 33aa6e

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:26
36Taming wild copies From hopeless crash to working exploit Taming wild copies From hopeless crash to working

Taming wild copies From hopeless crash to working exploit Taming wild copies From hopeless crash to working

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2015-03-27 04:19:46
37Advanced Heap Manipulation in Windows 8 Zhenhua(Eric) Liu  VERSION 1.2 Contents

Advanced Heap Manipulation in Windows 8 Zhenhua(Eric) Liu VERSION 1.2 Contents

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-04-01 08:11:01
38Instruction Set Filters and Other Exploit Defenses Changing the architecture to make exploitation harder. Taylor Hornby  Michael Locasto

Instruction Set Filters and Other Exploit Defenses Changing the architecture to make exploitation harder. Taylor Hornby Michael Locasto

Add to Reading List

Source URL: defuse.ca

Language: English - Date: 2013-10-29 20:03:22
39Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software Chongkyung Kil∗, Jinsuk Jun∗, Christopher Bookholt∗, Jun Xu†, Peng Ning∗ Department of Computer Science∗ North

Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software Chongkyung Kil∗, Jinsuk Jun∗, Christopher Bookholt∗, Jun Xu†, Peng Ning∗ Department of Computer Science∗ North

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:57
40Automatic Diagnosis and Response to Memory Corruption Vulnerabilities Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris Bookholt Cyber Defense Laboratory Department of Computer Science North Carolina State University

Automatic Diagnosis and Response to Memory Corruption Vulnerabilities Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris Bookholt Cyber Defense Laboratory Department of Computer Science North Carolina State University

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:02