Buffer overflow

Results: 538



#Item
201Software quality / Software testing / Shellcode / Buffer overflow / Arbitrary code execution / Heap overflow / Address space layout randomization / Fuzz testing / Return-to-libc attack / Computer security / Cyberwarfare / Software bugs

doi:[removed][removed]The idea is to identify security-critical software bugs so they can be fixed first. By Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumle

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
202Computability theory / Theoretical computer science / Software testing / Hacking / Vulnerability / Social vulnerability / Buffer overflow / Electronic signature / Halting problem / Mathematics / Applied mathematics / Computer science

Towards Automatic Generation of Vulnerability-Based Signatures David Brumley, James Newsome, and Dawn Song Carnegie Mellon University Pittsburgh, PA, USA {dbrumley,jnewsome,dawnsong}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
203Software bugs / Debuggers / Buffer overflow / Electronic filter / Filter / Vulnerability / Valgrind / Instruction set / Computing / Computer programming / Cyberwarfare

Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software James Newsome Carnegie Mellon University [removed]

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
204Software engineering / Software testing / Logic in computer science / Automated theorem proving / Concolic testing / Symbolic execution / Buffer overflow / Predicate transformer semantics / Precondition / Theoretical computer science / Software bugs / Mathematics

AEG: Automatic Exploit Generation Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao and David Brumley Carnegie Mellon University, Pittsburgh, PA {thanassis, sangkilc, brentlim, dbrumley}@cmu.edu Abstract

Add to Reading List

Source URL: security.ece.cmu.edu

Language: English - Date: 2011-05-02 14:34:52
205Software bugs / Address space layout randomization / Shellcode / PaX / Buffer overflow / Data Execution Prevention / Return-oriented programming / Grsecurity / Arbitrary code execution / Computer security / Cyberwarfare / Computing

security The Danger of Unrandomized Code E d w a r d J . Sc h w a r t z Ed is currently working on his

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-04-14 20:45:31
206Computer programming / Data-flow analysis / Pointer / Application security / SQL / Buffer overflow / Dataflow / Taint checking / Computing / Software engineering / Computer security

Dytan: A Generic Dynamic Taint Analysis Framework James Clause, Wanchun Li, and Alessandro Orso College of Computing Georgia Institute of Technology {clause|wli7|orso}@cc.gatech.edu

Add to Reading List

Source URL: www.cc.gatech.edu

Language: English - Date: 2007-07-12 05:25:09
207Data types / Software bugs / Computer arithmetic / Type theory / Type safety / Integer overflow / Signedness / Buffer overflow protection / C / Computing / Software engineering / Computer programming

RICH: Automatically Protecting Against Integer-Based Vulnerabilities David Brumley, Tzi-cker Chiueh, Robert Johnson [removed], [removed], [removed] Huijia Lin, Dawn Song [removed]el

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
208Software quality / Cyberwarfare / Vulnerability / Buffer overflow / Fuzz testing / Stack / Heap overflow / Exploit / Memory safety / Software bugs / Software testing / Computer security

Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications David Brumley, Pongsin Poosankam Dawn Song Jiang Zheng {dbrumley,ppoosank}@cs.cmu.edu [removed] [removed]

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
209Cyberwarfare / Stack buffer overflow / Buffer overflow / Uncontrolled format string / Vulnerability / Valgrind / C / Malware / Pointer / Computing / Software bugs / Software engineering

Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software James Newsome [removed] Carnegie Mellon University Abstract

Add to Reading List

Source URL: valgrind.org

Language: English - Date: 2006-08-12 00:33:35
210Software bugs / Data types / Computer errors / Primitive types / Arrays / Buffer overflow protection / Buffer overflow / Stack buffer overflow / Memory safety / Computing / Software engineering / Computer programming

A Practical Dynamic Buffer Overflow Detector Olatunji Ruwase Monica S. Lam Transmeta Corporation

Add to Reading List

Source URL: suif.stanford.edu

Language: English - Date: 2003-11-22 16:45:00
UPDATE