Buffer overflow

Results: 538



#Item
351Software bugs / C programming language / Computer errors / C POSIX library / C++ / Sizeof / Buffer overflow / Circular buffer / Printf format string / Computing / Computer programming / Software engineering

0x300 EXPLOITATION Program exploitation is a staple of hacking. As demonstrated in the previous chapter, a program is made up of a complex set of rules following a certain execution flow that ultimately tells the compute

Add to Reading List

Source URL: www.tinker.tv

Language: English - Date: 2012-02-08 15:24:21
352Software bugs / Data types / Primitive types / Memory management / Computer errors / Pointer / C / Segmentation fault / Buffer overflow / Computing / Software engineering / Computer programming

Mudflap: Pointer Use Checking for C/C++ Frank Ch. Eigler Red Hat [removed] Abstract

Add to Reading List

Source URL: gd.tuwien.ac.at

Language: English - Date: 2004-08-30 06:43:08
353Software bugs / Data types / Primitive types / Computer errors / Assembly languages / Buffer overflow / Shellcode / Pointer / Subroutine / Computing / Software engineering / Computer programming

INDEX Symbols & Numbers & (ampersand) for address-of operator, 45 for background process, 347

Add to Reading List

Source URL: www.tinker.tv

Language: English - Date: 2012-02-08 15:24:21
354Software bugs / Data types / Primitive types / Memory management / Computer errors / Pointer / C / Segmentation fault / Buffer overflow / Computing / Software engineering / Computer programming

Mudflap: Pointer Use Checking for C/C++ Frank Ch. Eigler Red Hat [removed] Abstract

Add to Reading List

Source URL: gd.tuwien.ac.at

Language: English - Date: 2004-08-30 06:43:08
355Software bugs / Shellcode / Buffer overflow / Address space layout randomization / Unistd.h / Transmission Control Protocol / GNU Debugger / Filesystem Hierarchy Standard / Stack / Computing / Software / Computer programming

CONTENTS IN DETAIL 0x100 INTRODUCTION 1

Add to Reading List

Source URL: www.tinker.tv

Language: English - Date: 2012-02-08 15:24:21
356Software testing / Software quality / Computer network security / Hacking / Vulnerability / Software security assurance / Software assurance / Application security / Buffer overflow / Cyberwarfare / Computer security / Security

ebXML Test Procedures DRAFT Document

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2013-05-07 16:54:57
357Software quality / Stack buffer overflow / Address space layout randomization / Buffer overflow protection / Return-to-libc attack / Buffer overflow / Stack / Shellcode / FALSE / Computing / Software bugs / Software engineering

Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2014-05-19 16:48:47
358Software bugs / C programming language / C++ / Sizeof / Stack / Address space layout randomization / C / Buffer overflow / Computing / Software engineering / Computer programming

Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazières, Dan Boneh Stanford University Hacking buffer overflows

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2014-05-19 23:54:20
359Software bugs / CPU cache / Cache / Central processing unit / Computer memory / Buffer overflow / Stack buffer overflow / Pointer / Self-modifying code / Computing / Software engineering / Computer programming

Secure Execution Via Program Shepherding Vladimir Kiriansky, Derek Bruening, Saman Amarasinghe Laboratory for Computer Science Massachusetts Institute of Technology Cambridge, MA[removed]vlk,iye,saman @lcs.mit.edu

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2009-01-29 13:05:34
360Security / Computer security / Security engineering / Computer network security / Vulnerability / Software security assurance / Software assurance / Application security / Buffer overflow / Software testing / Cyberwarfare / Software quality

ebXML Test Procedures DRAFT Document

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2013-05-07 16:54:56
UPDATE