Address space layout randomization

Results: 175



#Item
81Software testing / Computer security / Internet Explorer / Address space layout randomization / Adobe Acrobat / JavaScript / Vulnerability / Firefox / Universal 3D / Software / Computing / Cross-platform software

Client-side Vulnerability Report February 19, 2012 This report shows potential client application vulnerabilities found during this penetration test Summary

Add to Reading List

Source URL: www.advancedpentest.com

Language: English
82Computer programming / Pointer / Dangling pointer / Stack buffer overflow / Memory safety / Address space layout randomization / Buffer overflow / C / Memory corruption / Computing / Software engineering / Software bugs

SoK: Eternal War in Memory L´aszl´o Szekeres† , Mathias Payer‡ , Tao Wei∗‡ , Dawn Song‡ † Stony Brook University ‡ University of California, Berkeley ∗ Peking University

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:27
83MOV / Address space layout randomization / X86 / Computer architecture / X86 architecture / 7F

DEP/ASLR bypass without ROP/JIT Yang Yu @NSFOCUS Security Labs CanSecWest 2013 public

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2013-03-19 04:59:15
84C Standard Library / Return-to-libc attack / Address space layout randomization / Buffer overflow / GADGET / MOV / Shellcode / NX bit / Instruction selection / Computer architecture / Computing / Software bugs

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
85Software quality / Software testing / Shellcode / Buffer overflow / Arbitrary code execution / Heap overflow / Address space layout randomization / Fuzz testing / Return-to-libc attack / Computer security / Cyberwarfare / Software bugs

doi:[removed][removed]The idea is to identify security-critical software bugs so they can be fixed first. By Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumle

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
86Software bugs / Address space layout randomization / Shellcode / PaX / Buffer overflow / Data Execution Prevention / Return-oriented programming / Grsecurity / Arbitrary code execution / Computer security / Cyberwarfare / Computing

security The Danger of Unrandomized Code E d w a r d J . Sc h w a r t z Ed is currently working on his

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-04-14 20:45:31
87C Standard Library / Return-to-libc attack / Address space layout randomization / Buffer overflow / GADGET / MOV / Shellcode / NX bit / Instruction selection / Computer architecture / Computing / Software bugs

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2011-06-28 13:43:18
88Cyberwarfare / Buffer overflow / Stack buffer overflow / PaX / Memory safety / Return-to-libc attack / Address space layout randomization / Stack / Zero-day attack / Software bugs / Computer security / Computing

Chapter 1 Chapter 1 Introduction Even though memory corruption vulnerabilities are inherent to C, this language is

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2013-04-18 05:57:24
89Microsoft Windows / Windows Vista / Windows Server / Address space layout randomization / Windows Update / BitLocker Drive Encryption / Google Chrome / Application security / Patch / Software / System software / Computing

Take Advantage of Software Improvements Why Upgrade? Software security countermeasures are reactive in nature and evolve with the attack landscape. As

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2013-10-17 15:07:46
90Virtual address space / Virtual memory / Computing / Software / Executable space protection / Address space layout randomization / PaX / System software

The Design and Implementation of Address Space Layout Randomization (ASLR) in the Windows Research Kernel (WRK) Student: MAK Chung Leung Supervisor: Prof. Lin GU Introduction

Add to Reading List

Source URL: www.cse.ust.hk

Language: English - Date: 2012-08-24 04:50:13
UPDATE