Buffer overflow protection

Results: 81



#Item
51Software bugs / Data types / Subroutines / C++ / Buffer overflow protection / Control flow / Pointer / Stack / C / Software engineering / Computer programming / Computing

There is Safety in Numbers: Preventing Control-Flow Hijacking by Duplication Job Noorman, Nick Nikiforakis, and Frank Piessens IBBT-DistriNet, KU Leuven [removed]

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-01-01 13:06:09
52Computer programming / Buffer overflow protection / Stack buffer overflow / Buffer overflow / Heap overflow / Pointer / C dynamic memory allocation / Stack / Segmentation fault / Computing / Software engineering / Software bugs

ValueGuard: Protection of native applications against data-only buffer overflows Steven Van Acker, Nick Nikiforakis, Pieter Philippaerts, Yves Younan, and Frank Piessens IBBT-Distrinet Katholieke Universiteit Leuven

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-01-01 13:06:15
53Subroutines / Stack / Call stack / Pointer / Application checkpointing / C / Recursion / Stack machine / Buffer overflow protection / Computing / Software engineering / Computer programming

Portable Checkpointing for Heterogeneous Architectures Balkrishna Ramkumar Volker Strumpen Dept. of Electrical and Computer Engineering

Add to Reading List

Source URL: supertech.csail.mit.edu

Language: English - Date: 2014-09-16 08:27:50
54Computing / Software bugs / Hacking / Data security / Denial-of-service attack / Buffer overflow protection / Vulnerability / Firewall / Transmission Control Protocol / Computer network security / Computer security / Cyberwarfare

The Cracker Patch Choice: An Analysis of Post Hoc Security Techniques1 Crispin Cowan, Heather Hinton, Calton Pu, and Jonathan Walpole [removed], http://immunix.org/ WireX Communications, Inc.2 Abstract

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
55Software bugs / Buffer overflow protection / Buffer overflow / Stack buffer overflow / Stack / GNU Compiler Collection / Pointer / Function prologue / C / Computing / Software engineering / Computer programming

StackGuard: Simple Stack Smash Protection for GCC Perry Wagle Crispin Cowan∗ Immunix, Inc.† [removed], http://www.immunix.com/˜wagle

Add to Reading List

Source URL: gd.tuwien.ac.at

Language: English - Date: 2004-08-30 06:43:08
56Software bugs / Buffer overflow protection / Buffer overflow / Stack buffer overflow / Stack / GNU Compiler Collection / Pointer / Function prologue / C / Computing / Software engineering / Computer programming

StackGuard: Simple Stack Smash Protection for GCC Perry Wagle Crispin Cowan∗ Immunix, Inc.† [removed], http://www.immunix.com/˜wagle

Add to Reading List

Source URL: gd.tuwien.ac.at

Language: English - Date: 2004-08-30 06:43:08
57Software quality / Stack buffer overflow / Address space layout randomization / Buffer overflow protection / Return-to-libc attack / Buffer overflow / Stack / Shellcode / FALSE / Computing / Software bugs / Software engineering

Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2014-05-19 16:48:47
58Software bugs / MIT-SHM / Linux / X86 architecture / Xephyr / X Window System / Buffer overflow protection / X86-64 / Linux kernel / Software / System software / Computing

Exploiting large memory management vulnerabilities in Xorg server running on Linux version 1.0 Rafal Wojtczuk Invisible Things Lab

Add to Reading List

Source URL: www.invisiblethingslab.com

Language: English - Date: 2010-08-17 11:15:49
59Software bugs / Subroutines / Assembly languages / Central processing unit / Machine code / Calling convention / X86 assembly language / Buffer overflow protection / Stack buffer overflow / Computing / Computer architecture / Software engineering

Return-Oriented Programming: Systems, Languages, and Applications RYAN ROEMER, ERIK BUCHANAN, HOVAV SHACHAM and STEFAN SAVAGE University of California, San Diego We introduce return-oriented programming, a technique by

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2011-07-08 15:31:37
60Computer network security / Software testing / 105th United States Congress / Software bugs / Hacking / Digital Millennium Copyright Act / Buffer overflow / Vulnerability / Denial-of-service attack / Computer security / Cyberwarfare / Computing

Daniel McEnnis Proposal to exempt source code from protection under the anti-circumvention clause of the DMCA where source code is defined as a human readable description and/or

Add to Reading List

Source URL: www.copyright.gov

Language: English - Date: 2014-08-15 09:38:44
UPDATE