Buffer overflow

Results: 538



#Item
211Compiler construction / Compilers / Software bugs / C++ / Pointer / C / Undefined behavior / Stack / Buffer overflow / Computing / Software / Programming language implementation

Towards Optimization-Safe Systems: Analyzing the Impact of Undefined Behavior Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek, and Armando Solar-Lezama MIT CSAIL char *buf = ...;

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2013-10-31 19:17:31
212Software bugs / Pointer / Processor register / Computer errors / C / Stack buffer overflow / X86 assembly language / Computing / Software engineering / Computer programming

Hacking Techniques & Intrusion Detection Fall[removed]Dr. Ali Al-Shemery aka: B!n@ry

Add to Reading List

Source URL: www.binary-zone.com

Language: English - Date: 2012-12-01 12:24:26
213C Standard Library / Return-to-libc attack / Address space layout randomization / Buffer overflow / GADGET / MOV / Shellcode / NX bit / Instruction selection / Computer architecture / Computing / Software bugs

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2011-06-28 13:43:18
214Cyberwarfare / Buffer overflow / Stack buffer overflow / PaX / Memory safety / Return-to-libc attack / Address space layout randomization / Stack / Zero-day attack / Software bugs / Computer security / Computing

Chapter 1 Chapter 1 Introduction Even though memory corruption vulnerabilities are inherent to C, this language is

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2013-04-18 05:57:24
215Computing / Software testing / Hacking / Vulnerability / Buffer overflow / Intrusion prevention system / Social vulnerability / Zero-day attack / Exploit / Cyberwarfare / Computer security / Computer network security

224 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 5,

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
216Software bugs / X86 architecture / Trusted Execution Technology / Trusted computing / Rootkit / Malware / X86 virtualization / Buffer overflow / Intel / System software / Computer security / Computing

Mitigating Exploits, Rootkits and Advanced Persistent Threats David Durham, Senior Principal Engineer Intel Corporation

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2014-08-10 23:56:01
217Cyberwarfare / Buffer overflow / Stack buffer overflow / Vulnerability / PaX / Application checkpointing / Heap overflow / Valgrind / C standard library / Computing / Software bugs / Computer security

Sweeper: A Lightweight End-to-End System for Defending Against Fast Worms James Newsome David Brumley Dawn Song

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
218Cache / Disk buffer / Replication / Application checkpointing / Device file / Data buffer / RAID / Buffer overflow / Fault-tolerant system / Fault-tolerant computer systems / Computing / Computer hardware

ReViveI/O: Efficient Handling of I/O in Highly-Available Rollback-Recovery Servers∗ Jun Nakano, Pablo Montesinos, Kourosh Gharachorloo† , and Josep Torrellas University of Illinois at Urbana-Champaign † Google {nak

Add to Reading List

Source URL: iacoma.cs.uiuc.edu

Language: English - Date: 2005-12-16 14:06:42
219Computer programming / Cross-platform software / Computer errors / Stack buffer overflow / Buffer overflow / Java applet / Stack / JavaScript / Call stack / Computing / Software bugs / Software engineering

Title: Driving Home the Buffer Overflow Problem: A Training Module for Programmers and Managers Authors: Jedidiah R. Crandall, Susan L. Gerhart, Jan G. Hogle Affiliation: Embry-Riddle Aeronautical University Phone[removed]

Add to Reading List

Source URL: nsfsecurity.pr.erau.edu

Language: English - Date: 2002-06-26 11:47:13
220Software bugs / Cross-platform software / Buffer overflow / Uncontrolled format string / C standard library / Computer security / Pointer / C / Vulnerability / Computing / Software engineering / Computer programming

Microsoft Word - sscc-flier-dec29.doc

Add to Reading List

Source URL: www.plumhall.com

Language: English - Date: 2007-01-06 14:31:58
UPDATE