Buffer overflow

Results: 538



#Item
301Software bugs / Computer errors / Stack buffer overflow / Return-to-libc attack / Address space layout randomization / PaX / Buffer overflow / OpenBSD / Stack / Computing / Software engineering / Computer programming

Protecting Against Address Space Layout Randomization (ASLR) Compromises and Return-to-Libc Attacks Using Network Intrusion Detection Systems DAY, David and ZHAO, Zhengxu Available from Sheffield Hallam University Resear

Add to Reading List

Source URL: shura.shu.ac.uk

Language: English - Date: 2013-08-02 00:42:29
302Software quality / Buffer overflow protection / Buffer overflow / Heap overflow / C dynamic memory allocation / Setjmp.h / Memory leak / SQL Slammer / Blaster / Computing / Software bugs / Software engineering

Int. J. Inf. Secur[removed]DOI[removed]s10207[removed]S P E C I A L I S S U E PA P E R Stelios Sidiroglou · Angelos D. Keromytis

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2006-03-06 16:47:47
303Software bugs / Computer worms / Hacking / Software testing / Computer network security / Buffer overflow / Vulnerability / SQL Slammer / Blaster / Computer security / Cyberwarfare / System software

Network Worms Countering Network Worms Through Automatic Patch Generation To counter zero-day worms that exploit software flaws

Add to Reading List

Source URL: www1.cs.columbia.edu

Language: English - Date: 2005-11-02 15:56:06
304Virtual machines / Emulator / Buffer overflow / Crash / Mac 68K emulator / Dynamic recompilation / System software / Software / Computing

Hardware Support For Self-Healing Software Services Stelios Sidiroglou Michael E. Locasto Angelos D. Keromytis Department of Computer Science, Columbia University in the City of New York {stelios,locasto,angelos}@cs.colu

Add to Reading List

Source URL: www1.cs.columbia.edu

Language: English - Date: 2004-09-24 03:14:05
305Software engineering / Buffer overflow / Setjmp.h / Heap overflow / C dynamic memory allocation / Stack / Stack buffer overflow / Software bugs / Computing / Software quality

Using Execution Transactions To Recover From Buffer Overflow Attacks Stelios Sidiroglou Columbia University [removed] Angelos D. Keromytis

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2004-09-20 21:28:40
306Evidence / Global variable / Legal burden of proof / Law / Dräger / Buffer overflow

SUPREME COURT OF NEW JERSEY September Term 2005 Docket No. 58,879 STATE OF NEW JERSEY, Plaintiff-Appellant,

Add to Reading List

Source URL: www.judiciary.state.nj.us

Language: English - Date: 2011-05-20 13:58:58
307Software bugs / Virtual machines / Emulator / Buffer overflow / Crash / Mac 68K emulator / Network emulation / System software / Computing / Software

Hardware Support For Self-Healing Software Services Stelios Sidiroglou Michael E. Locasto Angelos D. Keromytis Department of Computer Science, Columbia University in the City of New York {stelios,locasto,angelos}@cs.colu

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2005-04-03 19:23:44
308Spamming / Internet / Internet privacy / Honeypot / Computer security / Data security / Proxy server / Buffer overflow / Web server / Computing / Computer network security / Software

Detecting Targeted Attacks Using Shadow Honeypots K. G. Anagnostakis† , S. Sidiroglou‡ , P. Akritidis? , K. Xinidis?, E. Markatos? , A. D. Keromytis‡ † CIS Department, Univ. of Pennsylvania [removed]n

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2005-05-17 14:49:41
309Security / Monoculture / Vulnerability / Malware / Attack / Address space layout randomization / Buffer overflow / Computer network security / Cyberwarfare / Computer security

IT Monoculture The Monoculture Risk Put into Context Conventional wisdom holds that software monocultures are exceptionally vulnerable to malware outbreaks. The

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2009-02-09 20:02:40
310Hacking / Computer security / Computer network security / GNU C Library / Vulnerability / Embedded GLIBC / CVSS / Debian / Buffer overflow / Software / Computing / C Standard Library

GHOST in Linux January 29, 2015 at 9:31am EST [codydumont] RESEARCH Confidential: The following report contains confidential information. Do not distribute, email, fax, or transfer via any electronic mechanism unless it

Add to Reading List

Source URL: www.tenable.com

Language: English - Date: 2015-01-29 09:44:19
UPDATE