Buffer overflow

Results: 538



#Item
101Computer network security / Failure / Zero-day attack / Buffer overflow / Vulnerability / Cyberwarfare / Computer security / Software testing

0002b510h: 0002b520h: 0002b530h: 0002b540h: 0002b550h: 0002b560h:

Add to Reading List

Source URL: www.blackhat.com

Language: English
102Software bugs / Software testing / Automated theorem proving / Concolic testing / Buffer overflow / Symbolic execution / Arithmetic overflow / String / C / Software engineering / Computing / Computer programming

University of California Los Angeles Symbolic Execution Algorithms for Test Generation

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2012-11-23 07:14:40
103Software bugs / Data types / Source code / Procedural programming languages / Pointer / C / Abstract interpretation / Static program analysis / Buffer overflow / Software engineering / Computing / Computer programming

Innovations in Systems and Software Engineering manuscript No. (will be inserted by the editor) Model Checking Driven Static Analysis for the Real World Designing and Tuning Large Scale Bug Detection Ansgar Fehnker · Ra

Add to Reading List

Source URL: www.cse.unsw.edu.au

Language: English - Date: 2013-01-01 18:09:41
104Computer network security / Shellcode / Software bugs / Polymorphic code / Buffer overflow / Metasploit Project / Exploit / Conficker / Computer virus / Cyberwarfare / Computer security / Computing

Real-world Polymorphic Attack Detection Michalis Polychronakis,1 Kostas G. Anagnostakis,2 Evangelos P. Markatos1 1 Institute of Computer Science, Foundation for Research & Technology – Hellas, {mikepo, markatos}@ics.fo

Add to Reading List

Source URL: www.ics.forth.gr

Language: English - Date: 2012-03-22 09:28:01
105Software bugs / Computer errors / Assembly languages / Buffer overflow / Stack buffer overflow / Denial-of-service attack / Stack / Call stack / Address space layout randomization / Computing / Software engineering / Computer programming

Automatic Diagnosis and Response to Memory Corruption Vulnerabilities Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris Bookholt Cyber Defense Laboratory Department of Computer Science North Carolina State University

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:02
106Computer programming / Computer errors / Address space layout randomization / Buffer overflow / C / Segmentation fault / Stack / Return-to-libc attack / Stack buffer overflow / Computing / Software bugs / Software engineering

Computer Science HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure Vulnerabilities Jason Gionta, William Enck,

Add to Reading List

Source URL: gionta.org

Language: English - Date: 2015-03-05 07:19:22
107Cyberwarfare / Buffer overflow / Exploit / GNU Debugger / Stack / Buffer overflow protection / Shellcode / Software bugs / Computing / Computer programming

CS 395, Section 22 Introduction to Computer Systems Dinda, Fall 2001

Add to Reading List

Source URL: www.cs.northwestern.edu

Language: English - Date: 2003-01-31 17:41:14
108Cross-platform software / Splint / Lint / C / Buffer overflow / Pointer / Iterator / Computing / Software engineering / Computer programming

Splint Manual VersionJune 2003 Secure Programming Group University of Virginia

Add to Reading List

Source URL: lclint.cs.virginia.edu

Language: English - Date: 2003-06-05 12:00:50
109Systems engineering / Shellcode / Microsoft Gadgets / Stack buffer overflow / Buffer overflow / Gadget / Return-to-libc attack / Return-oriented programming / Heap spraying / Computing / Software bugs / Software quality

Size Does Matter/Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-09-10 08:46:40
110Heap spraying / Address space layout randomization / Vulnerability / Buffer overflow / Shellcode / Heap feng shui / Alexander Sotirov / Exploit / Computer security / Cyberwarfare / Failure

PDF Document

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-09-16 18:43:29
UPDATE