Buffer overflow

Results: 538



#Item
321

Buffer Overflow SQL Injection Conclusioni Esercizi Riferimenti

Add to Reading List

Source URL: tunnuz.net

Language: Italian - Date: 2014-09-12 00:58:21
    322C dynamic memory allocation / Memory management / Buffer overflow / Computing / Fuzz testing / Software engineering / Computer network security / Codenomicon / Software testing / C Standard Library / Software bugs

    Sam Hocevar ([removed]) — Hacker Space Festival — June 21st, 2008 OVERVIEW ● What’s fuzzing?

    Add to Reading List

    Source URL: caca.zoy.org

    Language: English - Date: 2008-06-21 09:33:28
    323X86 architecture / Computer errors / X86 instructions / Assembly languages / Stack buffer overflow / X86 / MOV / Return-to-libc attack / Stack / Computing / Computer architecture / Software engineering

    Smashing the stack, an example from 2013 by Benjamin Randazzo August 2013 Stack overflow vulnerabilities have been made harder and harder to exploit over the years as

    Add to Reading List

    Source URL: www.exploit-db.com

    Language: English
    324Software bugs / Buffer overflow / Memory safety / Stack buffer overflow / Circular buffer / Splint / C string handling / Defensive programming / C standard library / Computing / Computer programming / Software engineering

    Statically Detecting Likely Buffer Overflow Vulnerabilities David Larochelle [removed] University of Virginia, Department of Computer Science David Evans [removed]

    Add to Reading List

    Source URL: lclint.cs.virginia.edu

    Language: English - Date: 2001-12-31 15:21:50
    325Central processing unit / Subroutines / Software bugs / Calling convention / Buffer overflow protection / Call stack / Register window / Function prologue / Stack buffer overflow / Computing / Computer architecture / Software engineering

    When Good Instructions Go Bad: Generalizing Return-Oriented Programming to RISC Erik Buchanan, Ryan Roemer, Hovav Shacham, and Stefan Savage Department of Computer Science & Engineering University of California, San Dieg

    Add to Reading List

    Source URL: www.erikbuchanan.com

    Language: English - Date: 2009-08-09 03:38:01
    326Software / Intrusion detection systems / Snort / Evasion / Intrusion detection system / Intrusion detection system evasion techniques / Denial-of-service attack / Buffer overflow / Network intrusion detection system / Computer network security / Cyberwarfare / Computer security

    IDS Evasion Techniques and Tactics

    Add to Reading List

    Source URL: bandwidthco.com

    Language: English - Date: 2012-02-12 19:18:28
    327C Standard Library / Computer errors / Stack buffer overflow / Return-to-libc attack / Address space layout randomization / Buffer overflow / MOV / X86 / Printf format string / Computing / Computer architecture / Software bugs

    Payload already inside: data re-use for ROP exploits

    Add to Reading List

    Source URL: media.blackhat.com

    Language: English - Date: 2012-04-07 14:53:12
    328Subroutines / Theoretical computer science / Software bugs / Recursion / Call graph / Compiler construction / Stack / Buffer overflow / Call stack / Computer programming / Software engineering / Computing

    Efficient Context-Sensitive Intrusion Detection Jonathon T. Giffin Somesh Jha Barton P. Miller

    Add to Reading List

    Source URL: www.isoc.org

    Language: English - Date: 2004-11-17 13:32:45
    329Hacking / Software testing / Vulnerability / Buffer overflow / Network Time Protocol / Ntpd / Przemysław Frasunek / Pwnie Awards / Cyberwarfare / Computer security / Computing

    State of Alaska Cyber Security & Critical Infrastructure Cyber Advisory December 19, 2014 The following cyber advisory was issued by the State of Alaska and was intended for State government entities. The information may

    Add to Reading List

    Source URL: doa.alaska.gov

    Language: English - Date: 2014-12-22 12:36:27
    330Computer programming / Memory management / Concurrent computing / Buffer overflow protection / Heap overflow / C dynamic memory allocation / Buffer overflow / Address space layout randomization / C / Computing / Software engineering / Software bugs

    HeapSentry: Kernel-assisted Protection against Heap Overflows Nick Nikiforakis, Frank Piessens, and Wouter Joosen iMinds-DistriNet, KU Leuven, 3001 Leuven, Belgium {firstname.lastname}@cs.kuleuven.be

    Add to Reading List

    Source URL: www.securitee.org

    Language: English - Date: 2013-04-22 08:41:11
    UPDATE