Buffer overflow protection

Results: 81



#Item
71Software quality / Buffer overflow protection / Buffer overflow / Malware / Vulnerability / Software bugs / Cyberwarfare / Computer security

Security is Broken The Future of Security Rik Farrow Sedona, Arizona [removed] http://rikfarrow.com for slides

Add to Reading List

Source URL: rikfarrow.com

Language: English - Date: 2008-01-19 22:56:22
72Compilers / GNU Compiler Collection / Register transfer language / Buffer overflow protection / Objective-C / GNU / Static single assignment form / MILEPOST GCC / Clang / Software / Computing / Computer programming

GNU C Compiler Internals en.wikibooks.org December 29, 2013

Add to Reading List

Source URL: upload.wikimedia.org

Language: English - Date: 2013-12-29 07:22:50
73Computer programming / Buffer overflow protection / Buffer overflow / Stack buffer overflow / C standard library / Code audit / Pointer / Stack / C / Computing / Software bugs / Software engineering

Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade* Crispin Cowan, Perry Wagle, Calton Pu,

Add to Reading List

Source URL: tmp-www.cpe.ku.ac.th

Language: English - Date: 2005-10-31 05:38:18
74Embedded operating systems / Buffer overflow protection / Debugging / Forth / LiteOS / Subroutine / Kernel / Thread / Embedded system / Computing / Computer programming / Software engineering

Declarative Tracepoints: A Programmable and Application Independent Debugging System for Wireless Sensor Networks

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2008-08-26 08:08:54
75Microsoft Windows / Computer virus / Malware / Vulnerability / Windows / Antivirus software / Cross-site scripting / Outlook Express / Buffer overflow / Software / Computer security / Cyberwarfare

National Infrastructure Protection Center CyberNotes Issue #[removed]

Add to Reading List

Source URL: www.iwar.org.uk

Language: English - Date: 2008-11-19 08:52:51
76Computer programming / Stack buffer overflow / Buffer overflow protection / Buffer overflow / Stack / Call stack / Subroutine / Pointer / Return-to-libc attack / Software bugs / Computing / Software engineering

Enlisting Hardware Architecture to Thwart Malicious Code Injection Ruby B. Lee, David K. Karig, John P. McGregor, and Zhijie Shi

Add to Reading List

Source URL: palms.ee.princeton.edu

Language: English - Date: 2004-07-02 15:00:06
77Memory management / Software bugs / Data types / Heap overflow / Shellcode / Buffer overflow / C dynamic memory allocation / Pointer / C / Computing / Software engineering / Computer programming

Defeating Microsoft Windows XP SP2 Heap protection and DEP bypass Alexander Anisimov, Positive Technologies.

Add to Reading List

Source URL: www.ptsecurity.com

Language: English - Date: 2012-03-01 08:37:03
78Machine code / X86 instructions / X86 architecture / X86 / Pin / Buffer overflow protection / Assembly language / INT / Shellcode / Computer architecture / Computing / Software bugs

Control-Flow Integrity Principles, Implementations, and Applications Mart´ın Abadi

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2005-09-14 14:11:39
79Central processing unit / Subroutines / Software bugs / Calling convention / Call stack / Buffer overflow protection / Register window / Function prologue / Stack buffer overflow / Computing / Computer architecture / Software engineering

PDF Document

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2008-08-13 23:28:17
80Software bugs / Debuggers / C Standard Library / Computer errors / GNU Debugger / Segmentation fault / Buffer overflow protection / Return-to-libc attack / Buffer overflow / Computing / Software / Computer programming

PDF Document

Add to Reading List

Source URL: www.infosecwriters.com

Language: English - Date: 2005-08-07 21:09:55
UPDATE