Buffer overflow protection

Results: 81



#Item
41Cyberwarfare / Computer memory / Software testing / Buffer overflow / Hacking / Circular buffer / Vulnerability / Data buffer / Buffer overflow protection / Software bugs / Computing / Software quality

BUFFER OVERFLOW SCAVENGER HUNT Susan Gerhart, [removed] Embry-Riddle Aeronautical University • Prescott, Arizona • USA

Add to Reading List

Source URL: nsfsecurity.pr.erau.edu

Language: English - Date: 2002-07-06 21:21:13
42Opera Mobile / Opera / Mobile browser / Mobile Web / .mobi / Buffer overflow protection / Software / Web browsers / Android software

Empowering Browser Security for Mobile Devices Using Smart CDNs Ben Livshits and David Molnar Microsoft Research 1

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2010-06-25 20:13:31
43Cyberwarfare / Buffer overflow / Circular buffer / Code Red / Vulnerability / Buffer overflow protection / Stack buffer overflow / Software bugs / Computing / Software quality

Labs and Exercises Using the Buffer Overflow Module Materials Susan Gerhart, [removed] Embry-Riddle Aeronautical University • Prescott, Arizona • USA This Document was Funded by the National Science Foundat

Add to Reading List

Source URL: nsfsecurity.pr.erau.edu

Language: English - Date: 2002-07-06 21:21:01
44Software bugs / Buffer overflow protection / Stack buffer overflow / Buffer overflow / Applet / Stack / Subroutine / Pointer / Circular buffer / Computing / Software engineering / Computer programming

Buffer Overflow demo: Embry-Riddle, NSF Scholarships for Service Grant

Add to Reading List

Source URL: nsfsecurity.pr.erau.edu

Language: English - Date: 2002-07-26 05:01:11
45Subroutines / Software bugs / Stack machine / Stack buffer overflow / Stack / Function prologue / Buffer overflow protection / Call stack / Tail call / Software engineering / Computing / Computer programming

The Performance Cost of Shadow Stacks and Stack Canaries Thurston H.Y. Dang Petros Maniatis

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-02-14 03:32:17
46Computer programming / Buffer overflow protection / Buffer overflow / Stack buffer overflow / C standard library / Code audit / Pointer / Stack / C / Computing / Software bugs / Software engineering

Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade* Crispin Cowan, Perry Wagle, Calton Pu, Steve Beattie, and Jonathan Walpole Department of Computer Science and Engineering Oregon Graduate Instit

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2011-02-02 18:35:15
47Software quality / Buffer overflow protection / Buffer overflow / Heap overflow / C dynamic memory allocation / Setjmp.h / Memory leak / SQL Slammer / Blaster / Computing / Software bugs / Software engineering

Int. J. Inf. Secur[removed]DOI[removed]s10207[removed]S P E C I A L I S S U E PA P E R Stelios Sidiroglou · Angelos D. Keromytis

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2006-03-06 16:47:47
48Central processing unit / Subroutines / Software bugs / Calling convention / Buffer overflow protection / Call stack / Register window / Function prologue / Stack buffer overflow / Computing / Computer architecture / Software engineering

When Good Instructions Go Bad: Generalizing Return-Oriented Programming to RISC Erik Buchanan, Ryan Roemer, Hovav Shacham, and Stefan Savage Department of Computer Science & Engineering University of California, San Dieg

Add to Reading List

Source URL: www.erikbuchanan.com

Language: English - Date: 2009-08-09 03:38:01
49Computer programming / Memory management / Concurrent computing / Buffer overflow protection / Heap overflow / C dynamic memory allocation / Buffer overflow / Address space layout randomization / C / Computing / Software engineering / Software bugs

HeapSentry: Kernel-assisted Protection against Heap Overflows Nick Nikiforakis, Frank Piessens, and Wouter Joosen iMinds-DistriNet, KU Leuven, 3001 Leuven, Belgium {firstname.lastname}@cs.kuleuven.be

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-04-22 08:41:11
50Computer security / Buffer overflow protection / Buffer overflow / Stack buffer overflow / PaX / Memory safety / Address space layout randomization / JIT spraying / Setjmp.h / Computing / Software bugs / Software engineering

RIPE: Runtime Intrusion Prevention Evaluator John Wilander Nick Nikiforakis Dept of Computer Science,

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-01-01 13:06:04
UPDATE