Buffer overflow

Results: 538



#Item
341Address space layout randomization / Buffer overflow / Software engineering / Heap overflow / Systems engineering / Software bugs / Computing / Sophos

Sophail: Applied attacks against Sophos Antivirus Tavis Ormandy [removed] Abstract By design, antivirus products introduce a vast attack surface to a hostile environment. The vendors of these products have a r

Add to Reading List

Source URL: lock.cmpxchg8b.com

Language: English - Date: 2013-06-24 02:07:40
342Memory management / Data Execution Prevention / Control flow / X86 architecture / NX bit / Buffer overflow / Address space layout randomization / Heap overflow / Stack buffer overflow / Computing / Software bugs / Computer errors

Bypassing Browser Memory Protections

Add to Reading List

Source URL: www.azimuthsecurity.com

Language: English - Date: 2010-04-10 04:10:26
343Software testing / Hacking / Robert C. Seacord / Computer network security / Vulnerability / Secure coding / Buffer overflow / Application security / Uncontrolled format string / Cyberwarfare / Computer security / Security

Overview Security Injection Modules

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-18 13:11:17
344Software bugs / Shellcode / Buffer overflow / Computer file formats / Address space layout randomization / Dynamic-link library / Heap overflow / Stack / Metasploit Project / Computing / Computer security / Cyberwarfare

BYPASSING EMET 4.1 Jared DeMott Security Researcher [removed]

Add to Reading List

Source URL: bromiumlabs.files.wordpress.com

Language: English - Date: 2014-02-24 02:03:23
345Buffer overflow / Stack / Shellcode / Software engineering / Software quality / Assembly languages / Software bugs / Computing / X86

A stack model for symbolic buffer overflow exploitability analysis Extended Abstract Gustavo Grieco University of Grenoble VERIMAG

Add to Reading List

Source URL: dcc.fceia.unr.edu.ar

Language: English - Date: 2013-03-12 10:48:31
346Design of experiments / Random number generation / Buffer overflow / Randomization / Computing / Scientific method / Statistics / Randomness / Address space layout randomization / Software bugs

Bypassing ASLR by predicting a process’ randomization Hagen Fritsch January 23nd, 2009

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-08-18 14:46:16
347Password / Improper input validation / Directory traversal attack / Buffer overflow / Canonicalization / Authorization / File system / Access control / Uniform resource locator / Computing / Software bugs / Computer security

[removed]Not Using a Random IV with CBC Mode 331 -

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2014-07-31 15:32:17
348Software bugs / Software testing / Directory traversal attack / Improper input validation / Canonicalization / UTF-8 / Pointer / Buffer overflow / File system / Computing / Cyberwarfare / Computer security

[removed]Other Intentional, Nonmalicious Weakness

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2014-07-31 15:32:17
349Software bugs / Buffer overflow protection / Buffer overflow / Stack buffer overflow / Stack / GNU Compiler Collection / Pointer / Function prologue / C / Computing / Software engineering / Computer programming

StackGuard: Simple Stack Smash Protection for GCC Perry Wagle Crispin Cowan∗ Immunix, Inc.† [removed], http://www.immunix.com/˜wagle

Add to Reading List

Source URL: gd.tuwien.ac.at

Language: English - Date: 2004-08-30 06:43:08
350Software bugs / Buffer overflow protection / Buffer overflow / Stack buffer overflow / Stack / GNU Compiler Collection / Pointer / Function prologue / C / Computing / Software engineering / Computer programming

StackGuard: Simple Stack Smash Protection for GCC Perry Wagle Crispin Cowan∗ Immunix, Inc.† [removed], http://www.immunix.com/˜wagle

Add to Reading List

Source URL: gd.tuwien.ac.at

Language: English - Date: 2004-08-30 06:43:08
UPDATE