Buffer overflow

Results: 538



#Item
3108_0321374460_ch06.qxd:42 PM

08_0321374460_ch06.qxd:42 PM

Add to Reading List

Source URL: advancedwindowsdebugging.com

Language: English - Date: 2010-10-05 20:46:28
32String Oriented Programming: When ASLR is not Enough Mathias Payer Thomas R. Gross  Department of Computer Science

String Oriented Programming: When ASLR is not Enough Mathias Payer Thomas R. Gross Department of Computer Science

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
33Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
    34String Oriented Programming  Circumventing ASLR, DEP, and other Guards Mathias Payer, ETH Zürich

    String Oriented Programming Circumventing ASLR, DEP, and other Guards Mathias Payer, ETH Zürich

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    35Control-Flow Bending: On the Effectiveness of Control-Flow Integrity Nicolas Carlini UC Berkeley  Antonio Barresi

    Control-Flow Bending: On the Effectiveness of Control-Flow Integrity Nicolas Carlini UC Berkeley Antonio Barresi

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    36IEEE  SECURITY& PRIVACY Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page

    IEEE SECURITY& PRIVACY Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    37Transformation-aware Exploit Generation using a HICFG  Dan Caselden Alex Bazhanyuk Mathias Payer Laszlo Szekeres

    Transformation-aware Exploit Generation using a HICFG Dan Caselden Alex Bazhanyuk Mathias Payer Laszlo Szekeres

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    38Too much PIE is bad for performance Mathias  Department of Computer Science, ETH Zurich Abstract Compiling an application as a Position Independent Executable (PIE) enables Address Space L

    Too much PIE is bad for performance Mathias Department of Computer Science, ETH Zurich Abstract Compiling an application as a Position Independent Executable (PIE) enables Address Space L

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    39I Control Your Code Attack Vectors through the Eyes of Software-based Fault Isolation Mathias Payer () Department of Computer Science, ETH Zurich Abstract

    I Control Your Code Attack Vectors through the Eyes of Software-based Fault Isolation Mathias Payer () Department of Computer Science, ETH Zurich Abstract

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    4015-213, Fall 20xx The Attack Lab: Understanding Buffer Overflow Bugs Assigned: Tue, Sept. 29 Due: Thu, Oct. 8, 11:59PM EDT Last Possible Time to Turn in: Sun, Oct. 11, 11:59PM EDT

    15-213, Fall 20xx The Attack Lab: Understanding Buffer Overflow Bugs Assigned: Tue, Sept. 29 Due: Thu, Oct. 8, 11:59PM EDT Last Possible Time to Turn in: Sun, Oct. 11, 11:59PM EDT

    Add to Reading List

    Source URL: csapp.cs.cmu.edu

    Language: English - Date: 2016-01-11 20:44:09