Address space

Results: 1014



#Item
351Address space layout randomization / Software quality / Computing / Systems engineering / JIT spraying / Software bugs / Shellcode / Buffer overflow

Chen XiaoBo Defeating windows 7 browser

Add to Reading List

Source URL: powerofcommunity.net

Language: English - Date: 2010-11-18 10:16:18
352Computing / NOP / Computer architecture / Systems engineering / Shellcode / Machine code / Address space layout randomization

Heap Taichi: Exploiting Memory Allocation Granularity in Heap-Spraying Attacks Yu Ding1, Tao Wei1, Tielei Wang1, Zhenkai Liang2, Wei Zou1 1Peking University, 2National University of Singapore

Add to Reading List

Source URL: powerofcommunity.net

Language: English - Date: 2010-12-05 20:13:17
353Security / Malware / Hacking / Software testing / Buffer overflow / Address space layout randomization / Computer worm / Attack / Vulnerability / Computer security / Cyberwarfare / Computer network security

Sting: An End-to-End Self-healing System for Defending against Zero-day Worm Attacks on Commodity Software James Newsome David Brumley

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
354Procedural programming languages / Address space layout randomization / Pointer / Hooking / Kernel / C / Computing / Software engineering / Computer programming

Combating the Advanced Memory Exploitation Techniques: Detecting ROP with Memory Information Leak nEINEI, Research Scientist @ McAfee Labs Chong Xu, Director of IPS Research @ McAfee Labs CanSecWest2014

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2014-03-21 01:12:50
355Exec Shield / Linux / NX bit / Process / Address space layout randomization / PaX / Exec / X86 / Pointer / Computing / Computer architecture / System software

Exec-shield 환경 내의 exploit 작성 방법

Add to Reading List

Source URL: powerofcommunity.net

Language: English - Date: 2008-11-04 08:59:42
356Software engineering / Buffer overflow / Stack buffer overflow / PaX / Address space layout randomization / Vulnerability / Memory safety / Pointer / Uncontrolled format string / Computing / Software bugs / Computer security

Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecting Servers ∗ Zhenkai Liang and R. Sekar Dept. of Computer Science, Stony Brook University

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2009-08-03 23:33:34
357Information / Computer file / RIS / COM file / Portable Document Format / Search engine indexing / MPEG-4 Part 14 / Parchive / JPEG / Computing / Computer file formats / Information science

Title page: Title: Word Template File for Earth, Planets and Space VersionAuthor #1: full name, institutional address, email address Author #2: full name, institutional address, email address Author #3: full

Add to Reading List

Source URL: www.earth-planets-space.org

Language: English - Date: 2014-09-16 19:49:45
358Software testing / Computer security / Internet Explorer / Address space layout randomization / Adobe Acrobat / JavaScript / Vulnerability / Firefox / Universal 3D / Software / Computing / Cross-platform software

Client-side Vulnerability Report February 19, 2012 This report shows potential client application vulnerabilities found during this penetration test Summary

Add to Reading List

Source URL: www.advancedpentest.com

Language: English
359Computer programming / Pointer / Dangling pointer / Stack buffer overflow / Memory safety / Address space layout randomization / Buffer overflow / C / Memory corruption / Computing / Software engineering / Software bugs

SoK: Eternal War in Memory L´aszl´o Szekeres† , Mathias Payer‡ , Tao Wei∗‡ , Dawn Song‡ † Stony Brook University ‡ University of California, Berkeley ∗ Peking University

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:27
360Parallel computing / Partitioned global address space / SPMD / Unified Parallel C / Co-array Fortran / Pointer / Task parallelism / C / Scalable parallelism / Computing / Software engineering / Computer programming

Parallel Languages and Compilers: Perspective from the Titanium Experience ∗ Katherine Yelick1,2 , Paul Hilfinger1 , Susan Graham1 , Dan Bonachea1 , Jimmy Su1 , Amir Kamil1 , Kaushik Datta1 , Phillip Colella2 , and Ton

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English
UPDATE