Buffer overflow

Results: 538



#Item
251Software bugs / Address space layout randomization / Microsoft Windows / Resource Interchange File Format / NX bit / ANI / Buffer overflow protection / Data Execution Prevention / Computer virus / Computer security / Computing / Cyberwarfare

VIRUS BULLETIN www.virusbtn.com EXPLOIT ANALYSIS ANI-HILATE THIS WEEK Peter Ferrie Symantec Security Response, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 16:13:20
252Software bugs / Debuggers / Buffer overflow / Electronic filter / Filter / Vulnerability / Valgrind / Instruction set / Computing / Computer programming / Cyberwarfare

Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software James Newsome Carnegie Mellon University [removed]

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2006-02-09 00:39:03
253Software / Computer network security / Computer security / Malware / Network security / Anti-worm / Buffer overflow / System software / Computer worms / Antivirus software

PDF Document

Add to Reading List

Source URL: intrinsicsecurity.com

Language: English - Date: 2006-06-14 02:00:24
254Cyberwarfare / Computer memory / Software testing / Buffer overflow / Hacking / Circular buffer / Vulnerability / Data buffer / Buffer overflow protection / Software bugs / Computing / Software quality

BUFFER OVERFLOW SCAVENGER HUNT Susan Gerhart, [removed] Embry-Riddle Aeronautical University • Prescott, Arizona • USA

Add to Reading List

Source URL: nsfsecurity.pr.erau.edu

Language: English - Date: 2002-07-06 21:21:13
255Opera Mobile / Opera / Mobile browser / Mobile Web / .mobi / Buffer overflow protection / Software / Web browsers / Android software

Empowering Browser Security for Mobile Devices Using Smart CDNs Ben Livshits and David Molnar Microsoft Research 1

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2010-06-25 20:13:31
256Hacking / Software testing / Cross-site scripting / Vulnerability / SQL injection / Privilege escalation / Uncontrolled format string / Arbitrary code execution / Buffer overflow / Cyberwarfare / Computer security / Failure

Benjamin Livshits and Monica S. Lam 1[removed].

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2005-08-06 17:30:40
257Cyberwarfare / Buffer overflow / Circular buffer / Code Red / Vulnerability / Buffer overflow protection / Stack buffer overflow / Software bugs / Computing / Software quality

Labs and Exercises Using the Buffer Overflow Module Materials Susan Gerhart, [removed] Embry-Riddle Aeronautical University • Prescott, Arizona • USA This Document was Funded by the National Science Foundat

Add to Reading List

Source URL: nsfsecurity.pr.erau.edu

Language: English - Date: 2002-07-06 21:21:01
258Computer programming / Cross-platform software / Computer errors / Stack buffer overflow / Buffer overflow / Java applet / Stack / JavaScript / Call stack / Computing / Software bugs / Software engineering

Title: Driving Home the Buffer Overflow Problem: A Training Module for Programmers and Managers Authors: Jedidiah R. Crandall, Susan L. Gerhart, Jan G. Hogle Affiliation: Embry-Riddle Aeronautical University Phone[removed]

Add to Reading List

Source URL: nsfsecurity.pr.erau.edu

Language: English - Date: 2002-02-04 11:51:48
259Buffer overflow / Information security / Intelligence Advanced Research Projects Activity / Cyberwarfare / Public safety / Security / Computer security / Heap overflow

Microsoft PowerPoint[removed]Stonesoup Proposer's Day Brief final-with vendor list rl

Add to Reading List

Source URL: www.iarpa.gov

Language: English - Date: 2014-03-06 18:49:04
260Software bugs / Data types / Primitive types / Assembly languages / Instruction set architectures / Buffer overflow / Pointer / Stack buffer overflow / X86 / Computing / Software engineering / Computer programming

Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis Mingwei Zhang1 , Aravind Prakash2 , Xiaolei Li1 , Zhenkai Liang1 , and Heng Yin2 1 School of Computing, National University

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2012-03-21 11:17:55
UPDATE