Buffer overflow

Results: 538



#Item
181Address space layout randomization / Software quality / Computing / Systems engineering / JIT spraying / Software bugs / Shellcode / Buffer overflow

Chen XiaoBo Defeating windows 7 browser

Add to Reading List

Source URL: powerofcommunity.net

Language: English - Date: 2010-11-18 10:16:18
182Memory management / Computer errors / Software bugs / Computer memory / Buffer overflow protection / Segmentation fault / Buffer overflow / Call stack / GNU Debugger / Computing / Computer programming / Software engineering

Guarded Memory Move (GMM) White Paper VERSION 0.5 Guarded Memory Move (GMM) Buffer Overflow Detection And Analysis Davide Libenzi

Add to Reading List

Source URL: xmailserver.org

Language: English - Date: 2007-02-16 03:03:26
183Software bugs / Debuggers / Buffer overflow / Electronic filter / Filter / Vulnerability / Valgrind / Instruction set / Computing / Computer programming / Cyberwarfare

Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software James Newsome Carnegie Mellon University

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:29
184Security / Malware / Hacking / Software testing / Buffer overflow / Address space layout randomization / Computer worm / Attack / Vulnerability / Computer security / Cyberwarfare / Computer network security

Sting: An End-to-End Self-healing System for Defending against Zero-day Worm Attacks on Commodity Software James Newsome David Brumley

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
185Software quality / Cyberwarfare / Vulnerability / Buffer overflow / Fuzz testing / Stack / Heap overflow / Exploit / Memory safety / Software bugs / Software testing / Computer security

Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications David Brumley, Pongsin Poosankam Dawn Song Jiang Zheng {dbrumley,ppoosank}@cs.cmu.edu

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2013-09-09 05:44:56
186Software bugs / Memory management / Software testing / Control flow / Daikon / Exception handling / Invariant / Buffer overflow / Call stack / Computing / Software engineering / Computer programming

Automatically Patching Errors in Deployed Software Jeff H. Perkinsα , Sunghun Kimβ , Sam Larsenγ , Saman Amarasingheα , Jonathan Bachrachα , Michael Carbinα , Carlos Pachecoδ , Frank Sherwood, Stelios Sidiroglouα

Add to Reading List

Source URL: www.cse.ust.hk

Language: English - Date: 2012-06-14 09:36:59
187Software engineering / Buffer overflow / Stack buffer overflow / PaX / Address space layout randomization / Vulnerability / Memory safety / Pointer / Uncontrolled format string / Computing / Software bugs / Computer security

Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecting Servers ∗ Zhenkai Liang and R. Sekar Dept. of Computer Science, Stony Brook University

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2009-08-03 23:33:34
188Compiler construction / Software bugs / Pointer / Branch table / Relocation / JMP / Subroutine / Buffer overflow / Control table / Computing / Software engineering / Computer programming

Practical Control Flow Integrity & Randomization for Binary Executables Chao Zhang1 , Tao Wei1,2∗ , Zhaofeng Chen1 , Lei Duan1 , L´aszl´o Szekeres2,3+ , Stephen McCamant2,4+ , Dawn Song2 , Wei Zou1 1 Beijing Key Lab

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:27
189Failure / Code Red / Hacking / Software testing / Vulnerability / Buffer overflow / Computer virus / Computer worm / Attack / Cyberwarfare / Computer security / Computer network security

Microsoft Word - PrestonLoftonEiC.doc

Add to Reading List

Source URL: www.mcandl.com

Language: English - Date: 2012-06-07 14:18:01
190Computability theory / Theoretical computer science / Software testing / Hacking / Vulnerability / Social vulnerability / Buffer overflow / Electronic signature / Halting problem / Mathematics / Applied mathematics / Computer science

Towards Automatic Generation of Vulnerability-Based Signatures David Brumley, James Newsome, and Dawn Song Carnegie Mellon University Pittsburgh, PA, USA {dbrumley,jnewsome,dawnsong}@cmu.edu

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
UPDATE