Arbitrary code execution

Results: 45



#Item
1Department of Electrical Engineering and Computer Science  MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
2Bouncer: Securing Software by Blocking Bad Input Manuel Costa Miguel Castro  Microsoft Research

Bouncer: Securing Software by Blocking Bad Input Manuel Costa Miguel Castro Microsoft Research

Add to Reading List

Source URL: www.sosp2007.org

Language: English - Date: 2016-06-15 13:09:51
3$hell on Earth: From Browser to System Compromise Matt Molinyawe, Abdul-Aziz Hariri, and Jasiel Spelman A Zero Day Initiative Research Paper

$hell on Earth: From Browser to System Compromise Matt Molinyawe, Abdul-Aziz Hariri, and Jasiel Spelman A Zero Day Initiative Research Paper

Add to Reading List

Source URL: documents.trendmicro.com

Language: English - Date: 2016-08-03 12:08:47
4Extreme Privilege Escalation on Windows 8/UEFI Systems

Extreme Privilege Escalation on Windows 8/UEFI Systems

Add to Reading List

Source URL: www.mitre.org

Language: English - Date: 2014-08-06 10:41:42
5Customer Advisory At OpenText, the security and privacy of your information is our top priority. Details OpenText is aware of and has been carefully monitoring the recent news surrounding Bourne Again Shell (Bash) remote

Customer Advisory At OpenText, the security and privacy of your information is our top priority. Details OpenText is aware of and has been carefully monitoring the recent news surrounding Bourne Again Shell (Bash) remote

Add to Reading List

Source URL: techsupport.gxs.com

Language: English - Date: 2014-11-05 17:42:00
6

PDF Document

Add to Reading List

Source URL: www.fox-it.com

Language: English - Date: 2015-04-22 11:55:11
7Network-Level Polymorphic Shellcode Detection Using Emulation Michalis Polychronakis1 , Kostas G. Anagnostakis2 , and Evangelos P. Markatos1 1  Institute of Computer Science, Foundation for Research & Technology – Hell

Network-Level Polymorphic Shellcode Detection Using Emulation Michalis Polychronakis1 , Kostas G. Anagnostakis2 , and Evangelos P. Markatos1 1 Institute of Computer Science, Foundation for Research & Technology – Hell

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-05-02 06:32:56
8EVOLUTION OF ANDROID EXPLOITS FROM A STATIC ANALYSIS TOOLS PERSPECTIVE VB2014: Anna Szalay & Jagadeesh Chandraiah

EVOLUTION OF ANDROID EXPLOITS FROM A STATIC ANALYSIS TOOLS PERSPECTIVE VB2014: Anna Szalay & Jagadeesh Chandraiah

Add to Reading List

Source URL: www.virusbtn.com

Language: English - Date: 2014-09-28 16:17:40
9Detecting Web Browser Heap Corruption Attacks Stephan Chenette Moti Joseph

Detecting Web Browser Heap Corruption Attacks Stephan Chenette Moti Joseph

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
10doi:[removed][removed]The idea is to identify security-critical software bugs so they can be fixed first. By Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumle

doi:[removed][removed]The idea is to identify security-critical software bugs so they can be fixed first. By Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumle

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01