Buffer overflow

Results: 538



#Item
331Software bugs / Stack buffer overflow / Memory safety / Buffer overflow / Vulnerability / Arbitrary code execution / Rootkit / Shellcode / Code injection / Computer security / Cyberwarfare / Computing

Recent Developments in Low-Level Software Security Pieter Agten, Nick Nikiforakis, Raoul Strackx, Willem De Groef, and Frank Piessens IBBT-Distrinet, Katholieke Universiteit Leuven, Belgium, [removed]uve

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-01-01 13:06:02
332Computer security / Buffer overflow protection / Buffer overflow / Stack buffer overflow / PaX / Memory safety / Address space layout randomization / JIT spraying / Setjmp.h / Computing / Software bugs / Software engineering

RIPE: Runtime Intrusion Prevention Evaluator John Wilander Nick Nikiforakis Dept of Computer Science,

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-01-01 13:06:04
333Software bugs / Data types / Subroutines / C++ / Buffer overflow protection / Control flow / Pointer / Stack / C / Software engineering / Computer programming / Computing

There is Safety in Numbers: Preventing Control-Flow Hijacking by Duplication Job Noorman, Nick Nikiforakis, and Frank Piessens IBBT-DistriNet, KU Leuven [removed]

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-01-01 13:06:09
334Computer programming / Buffer overflow protection / Stack buffer overflow / Buffer overflow / Heap overflow / Pointer / C dynamic memory allocation / Stack / Segmentation fault / Computing / Software engineering / Software bugs

ValueGuard: Protection of native applications against data-only buffer overflows Steven Van Acker, Nick Nikiforakis, Pieter Philippaerts, Yves Younan, and Frank Piessens IBBT-Distrinet Katholieke Universiteit Leuven

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-01-01 13:06:15
335Subroutines / Stack / Call stack / Pointer / Application checkpointing / C / Recursion / Stack machine / Buffer overflow protection / Computing / Software engineering / Computer programming

Portable Checkpointing for Heterogeneous Architectures Balkrishna Ramkumar Volker Strumpen Dept. of Electrical and Computer Engineering

Add to Reading List

Source URL: supertech.csail.mit.edu

Language: English - Date: 2014-09-16 08:27:50
336Formal methods / Mathematics / Diagrams / Specification and Description Language / Invariant / Finite-state machine / Extended finite-state machine / Vulnerability / Buffer overflow / Computing / Models of computation / Theoretical computer science

Abstracting Security Specifications in Building Survivable Systems J. Jenny Li and Mark Segal Telcordia Technologies (formerly Bellcore) 445 South Street, Morristown NJ[removed]USA Email: [removed]; Phone: (97

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
337Computing / Vulnerability / Denial-of-service attack / Attack / Penetration test / Buffer overflow / Exploit / JavaScript / Zero-day attack / Computer network security / Cyberwarfare / Computer security

Understanding the World of your Enemy with I-CAT (Internet- Categorization of Attacks Toolkit) Peter Mell NIST, Computer Security Division[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
338Computing / Software bugs / Hacking / Data security / Denial-of-service attack / Buffer overflow protection / Vulnerability / Firewall / Transmission Control Protocol / Computer network security / Computer security / Cyberwarfare

The Cracker Patch Choice: An Analysis of Post Hoc Security Techniques1 Crispin Cowan, Heather Hinton, Calton Pu, and Jonathan Walpole [removed], http://immunix.org/ WireX Communications, Inc.2 Abstract

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
339Computer network security / Software testing / Buffer overflow / Uncontrolled format string / Vulnerability / Cisco IOS / Cross-site scripting / Secure coding / JavaScript / Cyberwarfare / Computing / Computer security

Secure Coding Guide Contents Introduction to Secure Coding Guide 7 At a Glance 7

Add to Reading List

Source URL: developer.apple.com

Language: English - Date: 2014-11-21 15:12:39
340Computer network security / Anti-worm / Worms / Code Red / Nimda / Warhol worm / Buffer overflow / Morris worm / Computer virus / Malware / System software / Computer worms

Large Scale Malicious Code: A Research Agenda ∗† Nicholas Weaver Vern Paxson Silicon Defense & ICSI Center for UC Berkeley Internet Research

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2003-05-05 13:14:30
UPDATE