Buffer overflow

Results: 538



#Item
91Software bugs / Memory safety / Pointer / Stack buffer overflow / PaX / Buffer overflow / C / Vulnerability / Debugging / Computing / Software engineering / Computer programming

MemSherlock: An Automated Debugger for Unknown Memory Corruption Vulnerabilities ∗ Emre C. Sezer Peng Ning Chongkyung Kil Department of Computer Science

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:03
92Security / Software testing / Hacking / Vulnerability / CVSS / Security testing / Buffer overflow / Attack / Uncontrolled format string / Cyberwarfare / Computer security / Computer network security

Microsoft Word - unforgivable 3.doc

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-09-10 12:41:21
93Stack buffer overflow / Buffer overflow / Stack / Address space layout randomization / Memory address / Atmel AVR / Malware / Pointer / Transmission Control Protocol / Computing / Software bugs / Computer errors

Code Injection Attacks on Harvard-Architecture Devices Aurélien Francillon Claude Castelluccia INRIA Rhône-Alpes

Add to Reading List

Source URL: planete.inrialpes.fr

Language: English - Date: 2008-09-11 06:46:35
94Polymorphic code / Buffer overflow / Assembly languages / Self-modifying code / Computer programming / Shellcode / Polymorphic engine / Addressing mode / Malware / Computing / Software engineering

Analyzing Network Traffic To Detect Self-Decrypting ∗ Exploit Code Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer Cyber Defense Laboratory, Computer Science Department North Carolina State Universit

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:00
95Software bugs / Memory management / Buffer overflow / Pointer / X86 memory segmentation / C / Stack / X86 / Virtual memory / Computing / Software engineering / Computer programming

Program semantics-Aware Intrusion Detection Prof. Tzi-cker Chiueh Computer Science Department Stony Brook University

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:40
96Software quality / Stack buffer overflow / Buffer overflow protection / Buffer overflow / Address space layout randomization / PaX / Heap overflow / Return-to-libc attack / Exec Shield / Software bugs / Computing / Computer security

(un) Smashing the Stack: 66ee66dd66bb 33aa6e

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:26
97Software engineering / C Standard Library / C dynamic memory allocation / Memory management / Heap spraying / Address space layout randomization / Heap feng shui / Alexander Sotirov / Buffer overflow protection / Computing / Computer programming / Software bugs

Advanced Heap Manipulation in Windows 8 Zhenhua(Eric) Liu VERSION 1.2 Contents

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-04-01 08:11:01
98Hacking / Software bugs / Computer network security / Software testing / Vulnerability / Buffer overflow / SQL injection / Stack buffer overflow / Cross-site scripting / Computing / Cyberwarfare / Computer security

Software Bugs: Distribution, Exploitation and the Future Felix ‘FX’ Lindner, Recurity Labs GmbH, Introduction Significant research efforts were undertaken in the last years to detect and prevent

Add to Reading List

Source URL: www.recurity-labs.com

Language: English - Date: 2009-06-15 11:36:06
99Software bugs / Data types / Computer errors / Primitive types / Arrays / Buffer overflow protection / Buffer overflow / Stack buffer overflow / Memory safety / Computing / Software engineering / Computer programming

A Practical Dynamic Buffer Overflow Detector Olatunji Ruwase Monica S. Lam Transmeta Corporation

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:32
100Computer security / Computer file formats / Software testing / Zero-day attack / Vulnerability / Buffer overflow / Uncontrolled format string / String / File format / Computing / Cyberwarfare / Computer network security

The Art of File Format Fuzzing In September 2004, much hype was made of a buffer overflow vulnerability that existed in the Microsoft engine responsible for processing JPEG files. While the resulting vulnerability itself

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
UPDATE