Buffer overflow

Results: 538



#Item
161Software bugs / Subroutines / Memory management / Call stack / Buffer overflow protection / Pointer / Stack buffer overflow / Stack / C dynamic memory allocation / Computing / Software engineering / Computer programming

Automated Security Debugging Using Program Structural Constraints∗ Chongkyung Kil∗, Emre Can Sezer∗, Peng Ning∗, and Xiaolan Zhang† Department of Computer Science∗ North Carolina State University {ckil, eseze

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:58
162Malware / Software bugs / Shellcode / Antivirus software / Buffer overflow / Computer virus / Code injection / Portable Executable / Hooking / Cyberwarfare / Computer security / Failure

WiShMaster Windows Shellcode Mastery BlackHat EuropeBenjamin CAILLAT

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:29
163Computer security / Stack buffer overflow / Buffer overflow / Shellcode / Address space layout randomization / Stack / Pointer / PaX / Heap overflow / Software bugs / Computing / Software quality

\x90\x90\x90\x90\x90\x90\x90\x90 Stack Smashing as of Today A State-of-the-Art Overview on Buffer Overflow Protections

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:29
164C++ / Software bugs / Data types / Primitive types / Pointer / Dangling pointer / C / Virtual method table / Buffer overflow / Software engineering / Computing / Computer programming

DANGLING POINTER SMASHING THE POINTER FOR FUN AND PROFIT JONATHAN AFEK ADI SHARABANI A whitepaper from Watchfire

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
165Shellcode / Polymorphic code / Self-modifying code / MOV / Metasploit Project / Buffer overflow / Hacking: The Art of Exploitation Second Edition / Cyberwarfare / Computer security / Software

PDF Document

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-06-18 08:37:26
166Software engineering / Buffer overflow / Heap overflow / Stack buffer overflow / Memory corruption / Improper input validation / Stack / Software bugs / Software quality / Computing

Argos: The High-Interaction back-end Honeypot of NoAH

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2008-05-24 13:54:57
167Cyberwarfare / Security / Honeypot / Spamming / Buffer overflow / Stack buffer overflow / Heap overflow / Computer security / Client honeypot / Computer network security / Software bugs / Computing

SIXTH FRAMEWORK PROGRAMME Structuring the European Research Area Specific Programme RESEARCH INFRASTRUCTURES ACTION Contract No. RIDS

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-11-01 11:35:42
168Security / Software testing / Hacking / Vulnerability / CVSS / Security testing / Buffer overflow / Attack / Uncontrolled format string / Cyberwarfare / Computer security / Computer network security

Unforgivable Vulnerabilities Steve Christey The MITRE Corporation August 2, 2007

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
169Machine code / X86 instructions / Shellcode / Software bugs / X86 architecture / Buffer overflow / Self-modifying code / CPUID / NOP / Computer architecture / Computing / Cyberwarfare

Using Instruction Sequence Abstraction for Shellcode Detection and Attribution Ziming Zhao and Gail-Joon Ahn Laboratory of Security Engineering for Future Computing (SEFCOM) Arizona State University, Tempe, AZ 85281, USA

Add to Reading List

Source URL: www.public.asu.edu

Language: English - Date: 2013-07-11 17:06:53
170Software bugs / Computer errors / Memory management / Subroutines / X86 architecture / Volatile variable / Stack buffer overflow / Segmentation fault / Stack / Computing / Software engineering / Computer programming

First published November 8, 1996. Original raw text file: http://www.phrack.com/issues.html?issue=49&id=14&mode=txt This version is based on an HTML conversion by Prabhaker Mateti. It fixes errors in the original, with n

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2015-03-30 03:44:45
UPDATE