Buffer overflow

Results: 538



#Item
191Computer security / Buffer overflow / Vulnerability / Valgrind / Uncontrolled format string / Intrusion detection system / Cyberwarfare / Software bugs / Computing

Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software James Newsome Dawn Song May 2004

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:29
192Computer programming / Pointer / Dangling pointer / Stack buffer overflow / Memory safety / Address space layout randomization / Buffer overflow / C / Memory corruption / Computing / Software engineering / Software bugs

SoK: Eternal War in Memory L´aszl´o Szekeres† , Mathias Payer‡ , Tao Wei∗‡ , Dawn Song‡ † Stony Brook University ‡ University of California, Berkeley ∗ Peking University

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:27
193Malware / Hacking / Software testing / Buffer overflow / Vulnerability / Computer worm / Computer virus / Social vulnerability / Cyberwarfare / Computer security / Failure

Sting: An End-to-End Self-Healing System for Defending against Internet Worms David Brumley1 , James Newsome2 , and Dawn Song3 1 2 3

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
194Object-oriented programming / Virtual method table / Data types / Software bugs / Select / Pointer / Buffer overflow protection / Dynamic-link library / Fortran / Computing / Software engineering / Computer programming

VTint: Protecting Virtual Function Tables’ Integrity Chao Zhang∗ , Chengyu Song‡ , Kevin Zhijie Chen∗ , Zhaofeng Chen† , Dawn Song∗ ∗ University of California, Berkeley {chaoz, kevinchn, dawnsong}@cs.berkel

Add to Reading List

Source URL: www.internetsociety.org

Language: English - Date: 2015-02-07 13:00:50
195C dynamic memory allocation / Data segment / Mmap / Buffer overflow / Virtual memory / Out of memory / Pointer / Segmentation fault / 64-bit / Memory management / Computing / Computer memory

Large memory management vulnerabilities System, compiler, and application issues Gaël Delalleau

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2008-06-07 19:38:54
196Software engineering / Stack buffer overflow / Buffer overflow protection / Buffer overflow / Stack / C standard library / Setjmp.h / Denial-of-service attack / Write / Software bugs / Computing / Software quality

Design of a secure system Software Security Holes and Defenses u Follows a ring design.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-03-14 14:43:28
197Security / Software bugs / Software testing / Hacking / Vulnerability / Buffer overflow protection / Exploit / Attack / Buffer overflow / Cyberwarfare / Computer security / Computer network security

Relative Vulnerability: An Empirical Assurance Metric Crispin Cowan, PhD CTO, Immunix

Add to Reading List

Source URL: www.homeport.org

Language: English - Date: 2014-06-11 11:49:30
198Data types / Software bugs / Computer arithmetic / Type theory / Type safety / Integer overflow / Signedness / Buffer overflow protection / C / Computing / Software engineering / Computer programming

RICH: Automatically Protecting Against Integer-Based Vulnerabilities David Brumley, Tzi-cker Chiueh, Robert Johnson [removed], [removed], [removed] Huijia Lin, Dawn Song [removed]el

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2008-01-28 17:23:31
199C Standard Library / Return-to-libc attack / Address space layout randomization / Buffer overflow / GADGET / MOV / Shellcode / NX bit / Instruction selection / Computer architecture / Computing / Software bugs

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
200Software engineering / Software testing / Logic in computer science / Automated theorem proving / Concolic testing / Symbolic execution / Buffer overflow / Predicate transformer semantics / Precondition / Theoretical computer science / Software bugs / Mathematics

AEG: Automatic Exploit Generation Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao and David Brumley Carnegie Mellon University, Pittsburgh, PA {thanassis, sangkilc, brentlim, dbrumley}@cmu.edu Abstract

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
UPDATE