Address space layout randomization

Results: 175



#Item
61Embedded operating systems / OpenBSD / Address space layout randomization / PaX / Position-independent code / Library / Relocation / NetBSD / GNU Compiler Collection / Software / Computing / System software

Copyright © 2015 Pascal Stumpf Permission to use, copy, modify, and distribute this work for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear

Add to Reading List

Source URL: www.openbsd.org.my

Language: English - Date: 2015-03-15 03:31:17
62Embedded operating systems / Cross-platform software / Procedural programming languages / OpenBSD / Software bugs / Address space layout randomization / Buffer overflow protection / C dynamic memory allocation / Pascal / Computing / Software / Computer programming

Converting OpenBSD to PIE Pascal Stumpf <> AsiaBSDCon 2015, March 15, Tokyo Pascal Stumpf: Converting OpenBSD to PIE

Add to Reading List

Source URL: openbsd.md5.com.ar

Language: English - Date: 2015-03-15 03:31:17
63Address space layout randomization / NOP / Computer architecture / Computing / Exploit / Shellcode / JIT spraying / Machine code

JIT-SPRAY Attacks & Advanced Shellcode HITBSecConf 2010, Amsterdam Alexey Sintsov

Add to Reading List

Source URL: www.dsecrg.com

Language: English - Date: 2013-11-14 10:23:32
64Embedded operating systems / OpenBSD / Address space layout randomization / PaX / Position-independent code / Library / Relocation / NetBSD / GNU Compiler Collection / Software / Computing / System software

Copyright © 2015 Pascal Stumpf Permission to use, copy, modify, and distribute this work for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear

Add to Reading List

Source URL: www.obsd.si

Language: English - Date: 2015-03-15 03:31:17
65Embedded operating systems / Cross-platform software / Procedural programming languages / OpenBSD / Software bugs / Address space layout randomization / Buffer overflow protection / C dynamic memory allocation / Pascal / Computing / Software / Computer programming

Converting OpenBSD to PIE Pascal Stumpf <> AsiaBSDCon 2015, March 15, Tokyo Pascal Stumpf: Converting OpenBSD to PIE

Add to Reading List

Source URL: www.obsd.si

Language: English - Date: 2015-03-15 03:31:17
66Embedded operating systems / Cross-platform software / Procedural programming languages / OpenBSD / Software bugs / Address space layout randomization / Buffer overflow protection / C dynamic memory allocation / Pascal / Computing / Software / Computer programming

Converting OpenBSD to PIE Pascal Stumpf <> AsiaBSDCon 2015, March 15, Tokyo Pascal Stumpf: Converting OpenBSD to PIE

Add to Reading List

Source URL: www.openbsd.org.my

Language: English - Date: 2015-03-15 03:31:17
67Software quality / Stack buffer overflow / Address space layout randomization / Buffer overflow protection / Return-to-libc attack / Buffer overflow / Stack / Shellcode / FALSE / Computing / Software bugs / Software engineering

Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2014-08-24 01:28:14
68XNU / Address space layout randomization / Virtual memory / Computer architecture / Mach / Mac OS X

Let your Mach-O fly Vincenzo Iozzo

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:23
69Computer security / Stack buffer overflow / Buffer overflow / Shellcode / Address space layout randomization / Stack / Pointer / PaX / Heap overflow / Software bugs / Computing / Software quality

\x90\x90\x90\x90\x90\x90\x90\x90 Stack Smashing as of Today A State-of-the-Art Overview on Buffer Overflow Protections

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:29
70Software bugs / Shellcode / Data types / Type theory / Heap spraying / Buffer overflow / PaX / Address space layout randomization / Stack buffer overflow / Computing / Software engineering / Computer security

Heap Taichi: Exploiting Memory Allocation Granularity in Heap-Spraying Attacks Yu Ding1,2 , Tao Wei1,2∗, TieLei Wang1,2 , Zhenkai Liang3 , Wei Zou1,2 , Institute of Computer Science and Technology, Peking University Ke

Add to Reading List

Source URL: lenx.100871.net

Language: English - Date: 2012-05-09 22:08:36
UPDATE