Buffer overflow protection

Results: 81



#Item
41Cyberwarfare / Computer memory / Software testing / Buffer overflow / Hacking / Circular buffer / Vulnerability / Data buffer / Buffer overflow protection / Software bugs / Computing / Software quality

BUFFER OVERFLOW SCAVENGER HUNT Susan Gerhart, [removed] Embry-Riddle Aeronautical University • Prescott, Arizona • USA

Add to Reading List

Source URL: nsfsecurity.pr.erau.edu

Language: English - Date: 2002-07-06 21:21:13
42Empowering Browser Security for Mobile Devices Using Smart CDNs Ben Livshits and David Molnar Microsoft Research  1

Empowering Browser Security for Mobile Devices Using Smart CDNs Ben Livshits and David Molnar Microsoft Research 1

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2010-06-25 20:13:31
43Cyberwarfare / Buffer overflow / Circular buffer / Code Red / Vulnerability / Buffer overflow protection / Stack buffer overflow / Software bugs / Computing / Software quality

Labs and Exercises Using the Buffer Overflow Module Materials Susan Gerhart, [removed] Embry-Riddle Aeronautical University • Prescott, Arizona • USA This Document was Funded by the National Science Foundat

Add to Reading List

Source URL: nsfsecurity.pr.erau.edu

Language: English - Date: 2002-07-06 21:21:01
44Buffer Overflow demo: Embry-Riddle, NSF Scholarships for Service Grant

Buffer Overflow demo: Embry-Riddle, NSF Scholarships for Service Grant

Add to Reading List

Source URL: nsfsecurity.pr.erau.edu

Language: English - Date: 2002-07-26 05:01:11
45The Performance Cost of Shadow Stacks and Stack Canaries Thurston H.Y. Dang Petros Maniatis

The Performance Cost of Shadow Stacks and Stack Canaries Thurston H.Y. Dang Petros Maniatis

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-02-14 03:32:17
46Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade* Crispin Cowan, Perry Wagle, Calton Pu, Steve Beattie, and Jonathan Walpole Department of Computer Science and Engineering Oregon Graduate Instit

Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade* Crispin Cowan, Perry Wagle, Calton Pu, Steve Beattie, and Jonathan Walpole Department of Computer Science and Engineering Oregon Graduate Instit

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2011-02-02 18:35:15
47Int. J. Inf. Secur[removed]DOI[removed]s10207[removed]S P E C I A L I S S U E PA P E R  Stelios Sidiroglou · Angelos D. Keromytis

Int. J. Inf. Secur[removed]DOI[removed]s10207[removed]S P E C I A L I S S U E PA P E R Stelios Sidiroglou · Angelos D. Keromytis

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2006-03-06 16:47:47
48When Good Instructions Go Bad: Generalizing Return-Oriented Programming to RISC Erik Buchanan, Ryan Roemer, Hovav Shacham, and Stefan Savage Department of Computer Science & Engineering University of California, San Dieg

When Good Instructions Go Bad: Generalizing Return-Oriented Programming to RISC Erik Buchanan, Ryan Roemer, Hovav Shacham, and Stefan Savage Department of Computer Science & Engineering University of California, San Dieg

Add to Reading List

Source URL: www.erikbuchanan.com

Language: English - Date: 2009-08-09 03:38:01
49HeapSentry: Kernel-assisted Protection against Heap Overflows Nick Nikiforakis, Frank Piessens, and Wouter Joosen iMinds-DistriNet, KU Leuven, 3001 Leuven, Belgium {firstname.lastname}@cs.kuleuven.be

HeapSentry: Kernel-assisted Protection against Heap Overflows Nick Nikiforakis, Frank Piessens, and Wouter Joosen iMinds-DistriNet, KU Leuven, 3001 Leuven, Belgium {firstname.lastname}@cs.kuleuven.be

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-04-22 08:41:11
50RIPE: Runtime Intrusion Prevention Evaluator John Wilander Nick Nikiforakis  Dept of Computer Science,

RIPE: Runtime Intrusion Prevention Evaluator John Wilander Nick Nikiforakis Dept of Computer Science,

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-01-01 13:06:04