Buffer overflow

Results: 538



#Item
481Software quality / Stack buffer overflow / Shellcode / Vulnerability / Stack / X86 instruction listings / Pointer / X86 / Exploit / Computing / Software bugs / Cyberwarfare

University of Oxford Computing Laboratory MSc Computer Science Dissertation Automatic Generation of Control Flow Hijacking Exploits for Software Vulnerabilities

Add to Reading List

Source URL: www.cprover.org

Language: English - Date: 2009-10-05 15:17:48
482Software quality / Buffer overflow protection / Buffer overflow / Malware / Vulnerability / Software bugs / Cyberwarfare / Computer security

Security is Broken The Future of Security Rik Farrow Sedona, Arizona [removed] http://rikfarrow.com for slides

Add to Reading List

Source URL: rikfarrow.com

Language: English - Date: 2008-01-19 22:56:22
483Compilers / GNU Compiler Collection / Register transfer language / Buffer overflow protection / Objective-C / GNU / Static single assignment form / MILEPOST GCC / Clang / Software / Computing / Computer programming

GNU C Compiler Internals en.wikibooks.org December 29, 2013

Add to Reading List

Source URL: upload.wikimedia.org

Language: English - Date: 2013-12-29 07:22:50
484Computer security / Cryptographic software / Secure communication / OpenSSL / Buffer overflow / USENIX / Debian / Code Red / Vulnerability / Software / Software bugs / System software

Security holes…Who cares? Eric Rescorla RTFM, Inc. http://www.rtfm.com/ Preview of presentation

Add to Reading List

Source URL: www.rtfm.com

Language: English - Date: 2003-08-09 20:53:42
485Computer security / Embedded operating systems / Heap overflow / Buffer overflow / Computer network security / Cisco IOS / Router / Shellcode / Cisco Systems / Computing / Cyberwarfare / Software bugs

The Holy Grail: Cisco IOS Shellcode And Exploitation Techniques Michael Lynn Internet Security Systems

Add to Reading List

Source URL: bernd-paysan.de

Language: English - Date: 2005-07-30 09:17:01
486Memory management / Data Execution Prevention / Control flow / X86 architecture / NX bit / Buffer overflow / Address space layout randomization / Heap overflow / Stack buffer overflow / Computing / Software bugs / Computer errors

Bypassing Browser Memory Protections Setting back browser security by 10 years Alexander Sotirov Mark Dowd Introduction

Add to Reading List

Source URL: www.phreedom.org

Language: English - Date: 2013-06-01 20:57:45
487Computer programming / Stack buffer overflow / Data types / Buffer overflow / Return-to-libc attack / Primitive types / Address space layout randomization / C standard library / Constructor / Computing / Software bugs / Software engineering

Linux exploit development part 4 - ASCII armor bypass + return-to-plt NOTE: In case you missed my previous papers you can check them out here: Linux exploit development part 1 - Stack overflow Linux Exploit Writing Tuto

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2011-05-14 09:23:46
488Failure / Software testing / Hacking / Vulnerability / Exploit / Attack / Buffer overflow / Computer virus / Zero-day attack / Cyberwarfare / Computer security / Computer network security

The Lifecycle of a Vulnerability Copyright© 2005 internet Security Systems, Inc. All rights reserved worldwide Ahead of the threat.™ The Lifecycle of a Vulnerability

Add to Reading List

Source URL: www.iss.net

Language: English - Date: 2009-11-01 00:49:10
489Freedesktop.org / X Window System / Buffer overflow / Sleep mode / Buffer underrun / Crying / Troubleshooting / Data buffer / Software / Computing / System software

baby Operation, Service and Configuration Manual[removed]Troubleshooting (problem domain cry/scream mode[removed]Troubleshooting (problem domain cry/scream mode) This troubleshooting refers to the most typical problems c

Add to Reading List

Source URL: squawk.kuef.de

Language: English - Date: 2014-01-06 17:16:50
490Software / C Standard Library / Address space layout randomization / PaX / Return-to-libc attack / Stack buffer overflow / Grsecurity / Buffer overflow / Prelink / Computing / Computer security / Software bugs

On the Effectiveness of Address-Space Randomization Hovav Shacham Matthew Page Ben Pfaff

Add to Reading List

Source URL: benpfaff.org

Language: English - Date: 2014-06-05 00:52:52
UPDATE