Buffer overflow protection

Results: 81



#Item
21Embedded operating systems / Cross-platform software / Procedural programming languages / OpenBSD / Software bugs / Address space layout randomization / Buffer overflow protection / C dynamic memory allocation / Pascal / Computing / Software / Computer programming

Converting OpenBSD to PIE Pascal Stumpf <> AsiaBSDCon 2015, March 15, Tokyo Pascal Stumpf: Converting OpenBSD to PIE

Add to Reading List

Source URL: www.openbsd.dk

Language: English - Date: 2015-03-15 03:31:17
22Embedded operating systems / Cross-platform software / Procedural programming languages / OpenBSD / Software bugs / Address space layout randomization / Buffer overflow protection / C dynamic memory allocation / Pascal / Computing / Software / Computer programming

Converting OpenBSD to PIE Pascal Stumpf <> AsiaBSDCon 2015, March 15, Tokyo Pascal Stumpf: Converting OpenBSD to PIE

Add to Reading List

Source URL: openbsd.aise.re

Language: English - Date: 2015-03-15 03:31:17
23Embedded operating systems / Cross-platform software / Procedural programming languages / OpenBSD / Software bugs / Address space layout randomization / Buffer overflow protection / C dynamic memory allocation / Pascal / Computing / Software / Computer programming

Converting OpenBSD to PIE Pascal Stumpf <> AsiaBSDCon 2015, March 15, Tokyo Pascal Stumpf: Converting OpenBSD to PIE

Add to Reading List

Source URL: openbsd.md5.com.ar

Language: English - Date: 2015-03-15 03:31:17
24Computer errors / Machine code / Memory management / Segmentation fault / Stack buffer overflow / Buffer overflow protection / Buffer overflow / Pointer / Brainfuck / Computing / Software bugs / Software engineering

Defeating the Stack Based Buffer Overflow Prevention Mechanism of Microsoft Windows 2003 Server. David Litchfield () 8th September 2003

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:30
25Embedded operating systems / Cross-platform software / Procedural programming languages / OpenBSD / Software bugs / Address space layout randomization / Buffer overflow protection / C dynamic memory allocation / Pascal / Computing / Software / Computer programming

Converting OpenBSD to PIE Pascal Stumpf <> AsiaBSDCon 2015, March 15, Tokyo Pascal Stumpf: Converting OpenBSD to PIE

Add to Reading List

Source URL: www.obsd.si

Language: English - Date: 2015-03-15 03:31:17
26Embedded operating systems / Cross-platform software / Procedural programming languages / OpenBSD / Software bugs / Address space layout randomization / Buffer overflow protection / C dynamic memory allocation / Pascal / Computing / Software / Computer programming

Converting OpenBSD to PIE Pascal Stumpf <> AsiaBSDCon 2015, March 15, Tokyo Pascal Stumpf: Converting OpenBSD to PIE

Add to Reading List

Source URL: www.openbsd.org.my

Language: English - Date: 2015-03-15 03:31:17
27Software quality / Stack buffer overflow / Address space layout randomization / Buffer overflow protection / Return-to-libc attack / Buffer overflow / Stack / Shellcode / FALSE / Computing / Software bugs / Software engineering

Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2014-08-24 01:28:14
28Software bugs / Subroutines / Memory management / Call stack / Buffer overflow protection / Pointer / Stack buffer overflow / Stack / C dynamic memory allocation / Computing / Software engineering / Computer programming

Automated Security Debugging Using Program Structural Constraints∗ Chongkyung Kil∗, Emre Can Sezer∗, Peng Ning∗, and Xiaolan Zhang† Department of Computer Science∗ North Carolina State University {ckil, eseze

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:58
29Memory management / Computer errors / Software bugs / Computer memory / Buffer overflow protection / Segmentation fault / Buffer overflow / Call stack / GNU Debugger / Computing / Computer programming / Software engineering

Guarded Memory Move (GMM) White Paper VERSION 0.5 Guarded Memory Move (GMM) Buffer Overflow Detection And Analysis Davide Libenzi

Add to Reading List

Source URL: xmailserver.org

Language: English - Date: 2007-02-16 03:03:26
30Object-oriented programming / Virtual method table / Data types / Software bugs / Select / Pointer / Buffer overflow protection / Dynamic-link library / Fortran / Computing / Software engineering / Computer programming

VTint: Protecting Virtual Function Tables’ Integrity Chao Zhang∗ , Chengyu Song‡ , Kevin Zhijie Chen∗ , Zhaofeng Chen† , Dawn Song∗ ∗ University of California, Berkeley {chaoz, kevinchn, dawnsong}@cs.berkel

Add to Reading List

Source URL: www.internetsociety.org

Language: English - Date: 2015-02-07 13:00:50
UPDATE