Buffer overflow protection

Results: 81



#Item
51There is Safety in Numbers: Preventing Control-Flow Hijacking by Duplication Job Noorman, Nick Nikiforakis, and Frank Piessens IBBT-DistriNet, KU Leuven [removed]

There is Safety in Numbers: Preventing Control-Flow Hijacking by Duplication Job Noorman, Nick Nikiforakis, and Frank Piessens IBBT-DistriNet, KU Leuven [removed]

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-01-01 13:06:09
52ValueGuard: Protection of native applications against data-only buffer overflows Steven Van Acker, Nick Nikiforakis, Pieter Philippaerts, Yves Younan, and Frank Piessens IBBT-Distrinet Katholieke Universiteit Leuven

ValueGuard: Protection of native applications against data-only buffer overflows Steven Van Acker, Nick Nikiforakis, Pieter Philippaerts, Yves Younan, and Frank Piessens IBBT-Distrinet Katholieke Universiteit Leuven

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-01-01 13:06:15
53Portable Checkpointing for Heterogeneous Architectures Balkrishna Ramkumar Volker Strumpen  Dept. of Electrical and Computer Engineering

Portable Checkpointing for Heterogeneous Architectures Balkrishna Ramkumar Volker Strumpen Dept. of Electrical and Computer Engineering

Add to Reading List

Source URL: supertech.csail.mit.edu

Language: English - Date: 2014-09-16 08:27:50
54The Cracker Patch Choice: An Analysis of Post Hoc Security Techniques1 Crispin Cowan, Heather Hinton, Calton Pu, and Jonathan Walpole [removed], http://immunix.org/ WireX Communications, Inc.2 Abstract

The Cracker Patch Choice: An Analysis of Post Hoc Security Techniques1 Crispin Cowan, Heather Hinton, Calton Pu, and Jonathan Walpole [removed], http://immunix.org/ WireX Communications, Inc.2 Abstract

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
55StackGuard: Simple Stack Smash Protection for GCC Perry Wagle Crispin Cowan∗ Immunix, Inc.† [removed], http://www.immunix.com/˜wagle

StackGuard: Simple Stack Smash Protection for GCC Perry Wagle Crispin Cowan∗ Immunix, Inc.† [removed], http://www.immunix.com/˜wagle

Add to Reading List

Source URL: gd.tuwien.ac.at

Language: English - Date: 2004-08-30 06:43:08
56StackGuard: Simple Stack Smash Protection for GCC Perry Wagle Crispin Cowan∗ Immunix, Inc.† [removed], http://www.immunix.com/˜wagle

StackGuard: Simple Stack Smash Protection for GCC Perry Wagle Crispin Cowan∗ Immunix, Inc.† [removed], http://www.immunix.com/˜wagle

Add to Reading List

Source URL: gd.tuwien.ac.at

Language: English - Date: 2004-08-30 06:43:08
57Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2014-05-19 16:48:47
58Exploiting large memory management vulnerabilities in Xorg server running on Linux version 1.0 Rafal Wojtczuk Invisible Things Lab

Exploiting large memory management vulnerabilities in Xorg server running on Linux version 1.0 Rafal Wojtczuk Invisible Things Lab

Add to Reading List

Source URL: www.invisiblethingslab.com

Language: English - Date: 2010-08-17 11:15:49
59Return-Oriented Programming: Systems, Languages, and Applications RYAN ROEMER, ERIK BUCHANAN, HOVAV SHACHAM and STEFAN SAVAGE University of California, San Diego  We introduce return-oriented programming, a technique by

Return-Oriented Programming: Systems, Languages, and Applications RYAN ROEMER, ERIK BUCHANAN, HOVAV SHACHAM and STEFAN SAVAGE University of California, San Diego We introduce return-oriented programming, a technique by

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2011-07-08 15:31:37
60Daniel McEnnis  Proposal to exempt source code from protection under the anti-circumvention clause of the DMCA where source code is defined as a human readable description and/or

Daniel McEnnis Proposal to exempt source code from protection under the anti-circumvention clause of the DMCA where source code is defined as a human readable description and/or

Add to Reading List

Source URL: www.copyright.gov

Language: English - Date: 2014-08-15 09:38:44