<--- Back to Details
First PageDocument Content
Software bugs / Address space layout randomization / PaX / Buffer overflow / Stack buffer overflow / Heap overflow / JIT spraying / Uncontrolled format string / Heap spraying / Computer security / Computing / Cyberwarfare
Date: 2012-07-17 11:27:12
Software bugs
Address space layout randomization
PaX
Buffer overflow
Stack buffer overflow
Heap overflow
JIT spraying
Uncontrolled format string
Heap spraying
Computer security
Computing
Cyberwarfare

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Download Document from Source Website

File Size: 514,19 KB

Share Document on Facebook

Similar Documents

Web browsers / Pwn2Own / Hacking / Vulnerability / Safari / Heap spraying / Google Chrome / Exploit / Buffer overflow / Arbitrary code execution / Internet Explorer / Privilege escalation

$hell on Earth: From Browser to System Compromise Matt Molinyawe, Abdul-Aziz Hariri, and Jasiel Spelman A Zero Day Initiative Research Paper

DocID: 1p8BX - View Document

Heap spraying / Heap overflow / Shellcode / C++ / Heap feng shui / Alexander Sotirov / C dynamic memory allocation / Heap / Software bugs / JavaScript / NOP slide / Buffer overflow

風水 Heap Feng Shui in JavaScript Alexander Sotirov Introduction

DocID: 1msbL - View Document

Software bugs / Cross-platform software / Heap spraying / Heap overflow / Shellcode / Computer errors / Heap feng shui / Alexander Sotirov / C dynamic memory allocation / Computing / Software engineering / Cyberwarfare

風水 Heap Feng Shui in JavaScript Alexander Sotirov Introduction

DocID: 1aZXg - View Document

Software engineering / C Standard Library / C dynamic memory allocation / Memory management / Heap spraying / Address space layout randomization / Heap feng shui / Alexander Sotirov / Buffer overflow protection / Computing / Computer programming / Software bugs

Advanced Heap Manipulation in Windows 8 Zhenhua(Eric) Liu VERSION 1.2 Contents

DocID: 18uNk - View Document

Systems engineering / Shellcode / Microsoft Gadgets / Stack buffer overflow / Buffer overflow / Gadget / Return-to-libc attack / Return-oriented programming / Heap spraying / Computing / Software bugs / Software quality

Size Does Matter/Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard

DocID: 17zOD - View Document