Buffer overflow

Results: 538



#Item
111Software bugs / Subroutines / Instruction set architectures / Calling convention / X86 architecture / X86 assembly language / Buffer overflow / Return-to-libc attack / X86 / Computing / Software engineering / Computer architecture

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:11
112Software bugs / Central processing unit / NX bit / Buffer overflow / NX technology / Data Execution Prevention / Operating system / Black Hat Briefings / Code injection / Computer security / Software / Computing

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
113Malware / Shellcode / Software bugs / Polymorphic code / Buffer overflow / Arbitrary code execution / Self-modifying code / Metasploit Project / Forth / Cyberwarfare / Computer security / Computing

Network-Level Polymorphic Shellcode Detection Using Emulation Michalis Polychronakis1 , Kostas G. Anagnostakis2 , and Evangelos P. Markatos1 1 Institute of Computer Science, Foundation for Research & Technology – Hell

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-05-02 06:32:56
114Cyberwarfare / Software quality / Fuzz testing / Hacking / Vulnerability / Buffer overflow / Uncontrolled format string / Computer network security / Software testing / Computer security / Software bugs

Software Vulnerability • Refers to a weakness in a system allowing an attacker to violate the integrity, confidentiality, access control, availability, consistency or audit mechanism of the system or the data and appl

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
115Computer security / Elias Levy / Buffer overflow / Privilege escalation / Bugtraq / Phrack / Heap overflow / Stack buffer overflow / Vulnerability / Software bugs / Software quality / Computing

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:11
116Design of experiments / Random number generation / Buffer overflow / Randomization / Computing / Scientific method / Statistics / Randomness / Address space layout randomization / Software bugs

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:33
117Denial-of-service attacks / MOV / Buffer overflow / Vulnerability / Exploit / Denial-of-service attack / Payload / Cyberwarfare / Computer security / Computing

Milliseconds To Owned: Walking Tour of a Drive By Exploit Patrick Thomas

Add to Reading List

Source URL: coffeetocode.net

Language: English - Date: 2010-04-18 21:40:41
118Software bugs / TestDisk / Stack buffer overflow / Buffer overflow / Vulnerability / Attack / Stack / Computing / Software / Cyberwarfare

Vulnerability Advisory – Vendor Disclosure Name TestDisk check_OS2MB Stack Buffer overflow Vendor Website

Add to Reading List

Source URL: www.security-assessment.com

Language: English - Date: 2015-04-30 00:52:34
119Software engineering / Stack buffer overflow / Buffer overflow / Address space layout randomization / PaX / Heap overflow / NX bit / Uncontrolled format string / Stack / Computing / Software bugs / Software quality

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:33
120Subroutines / Call stack / Stack / Application programming interface / Stack machine / Buffer overflow protection / Software engineering / Computer programming / Computing

Paradyn Parallel Performance Tools StackwalkerAPI Programmer’s Guide 8.2 Release Aug 2014

Add to Reading List

Source URL: www.paradyn.org

Language: English - Date: 2014-08-19 15:19:30
UPDATE