Buffer overflow

Results: 538



#Item
131Software bugs / Pointer / Buffer overflow / C / Integer overflow / Type system / Java / Memory leak / Data type / Computing / Computer programming / Software engineering

Section 8.1 Introduction to Correctness and Robustness A PROGRAM is correct if it accomplishes the task that it was designed to perform. It is robust if it can handle illegal inputs and other unexpected situations in a

Add to Reading List

Source URL: www.saylor.org

Language: English - Date: 2013-03-20 16:15:11
132Computer network security / FTP clients / Microsoft Windows / Hacking / Vulnerability / Internet Explorer 6 / Buffer overflow / Internet Explorer / Windows Vista / Computer security / Computing / Cyberwarfare

Software Vulnerability Exploitation Trends Exploring the impact of software mitigations on patterns of vulnerability exploitation Software Vulnerability Exploitation Trends This document is for informational purposes on

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2013-07-24 13:36:39
133Computer programming / PaX / Buffer overflow protection / Stack buffer overflow / Valgrind / Buffer overflow / Shellcode / X86 / Executable / Computing / Software bugs / Computer security

Randomized Instruction Set Emulation ∗ to Disrupt Binary Code Injection Attacks Elena Gabriela Barrantes David H. Ackley

Add to Reading List

Source URL: www.cs.unm.edu

Language: English - Date: 2003-09-09 13:38:33
134Software bugs / Process / Shellcode / Emulator / Honeypot / Buffer overflow / Client honeypot / Fork / QEMU / Computing / Software / System software

Eudaemon: Involuntary and On-Demand Emulation Against Zero-Day Exploits Georgios Portokalidis Herbert Bos

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2008-10-21 09:31:23
135Software engineering / Buffer overflow / Pointer / Vulnerability / OpenBSD security features / Off-by-one error / Software bugs / Software quality / Computing

Taming Bugs The Art and Science of writing secure Code Paul Böhm http://www.sec-consult.com/

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:31
136Computer programming / Buffer overflow protection / Buffer overflow / Stack buffer overflow / C standard library / Code audit / Pointer / C / Stack / Computing / Software bugs / Software engineering

Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade* Crispin Cowan, Perry Wagle, Calton Pu, Steve Beattie, and Jonathan Walpole Department of Computer Science and Engineering Oregon Graduate Instit

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2013-04-04 20:24:06
137Computer programming / Buffer overflow / Off-by-one error / Pointer / Integer overflow / Circular buffer / String / Defensive programming / C / Software bugs / Computing / Software engineering

Taming Bugs The Art and Science of writing secure Code Paul Böhm

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
138Cyberwarfare / Software testing / Hacking / Greg Hoglund / Buffer overflow / Vulnerability / Exploit / Race condition / Software bugs / Software quality / Computing

Runtime Decompilation The ‘GreyBox’ process for Exploiting Software By: Greg Hoglund

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:30
139Computer security / Spamming / Honeypot / Electronic commerce / Secure communication / Buffer overflow / Computing / Gerd Tellenbach / Evasion / Computer network security / Cyberwarfare / Security

Celeste - Distributed Secure Storage

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-09-25 08:44:12
140Software bugs / Process / Shellcode / Emulator / Honeypot / Buffer overflow / Client honeypot / Fork / QEMU / Computing / Software / System software

Eudaemon: Involuntary and On-Demand Emulation Against Zero-Day Exploits Georgios Portokalidis Herbert Bos

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2008-03-11 00:44:06
UPDATE