Buffer overflow

Results: 538



#Item
41Computing / Software engineering / Software bugs / Computer programming / Pointer / Stack buffer overflow / Address space layout randomization / Buffer overflow / Dangling pointer / Memory safety / C dynamic memory allocation / Return-to-libc attack

SoK: Eternal War in Memory L´aszl´o Szekeres† , Mathias Payer‡ , Tao Wei∗‡ , Dawn Song‡ † Stony Brook University ‡ University of California, Berkeley ∗ Peking University

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
42Computing / Software / Software bugs / Programming language implementation / Subroutines / Portable Executable / Position-independent code / Object file / Dynamic linker / Stack buffer overflow / Buffer overflow / Return-to-libc attack

Retrospective Protection utilizing Binary Rewriting Sergej Proskurin, Fatih Kilic, Claudia Eckert1 Abstract: Buffer overflow vulnerabilities present a common threat. To encounter this issue, operating system support and

Add to Reading List

Source URL: www.sec.in.tum.de

Language: English - Date: 2015-06-23 06:38:59
43

The following paper was originally published in the Proceedings of the 7th USENIX Security Symposium San Antonio, Texas, January 26-29, 1998 StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Atta

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2002-04-30 18:05:07
    44Computing / Software / Computer architecture / Software bugs / Computing platforms / Address space layout randomization / C standard library / PaX / Buffer overflow / Stack buffer overflow / Linux / Android

    Curriculum Vitae Name: Current: Studies: Address:

    Add to Reading List

    Source URL: hmarco.org

    Language: English - Date: 2016-04-07 10:01:31
    45Heap spraying / Heap overflow / Shellcode / C++ / Heap feng shui / Alexander Sotirov / C dynamic memory allocation / Heap / Software bugs / JavaScript / NOP slide / Buffer overflow

    風水 Heap Feng Shui in JavaScript Alexander Sotirov Introduction

    Add to Reading List

    Source URL: www.trailofbits.com

    Language: English - Date: 2016-04-15 11:36:17
    46Software bugs / Buffer overflow / Open Source Vulnerability Database / Computer security / Computer memory / Morris worm / Memory corruption / Vulnerability / Computer worm / Blackhat

    Memory Corruption Attacks The (almost) Complete History thinkst applied research haroon meer

    Add to Reading List

    Source URL: media.blackhat.com

    Language: English - Date: 2012-04-07 14:53:12
    47Computing / Software bugs / Software engineering / Blind return oriented programming / Computer errors / Return-oriented programming / Stack buffer overflow / Return-to-libc attack / Address space layout randomization / Buffer overflow / Shellcode / Stack

    Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

    Add to Reading List

    Source URL: www.scs.stanford.edu

    Language: English - Date: 2016-01-02 20:09:14
    48Computer security / Computer network security / Vulnerability / Software testing / Vulnerability database / National Vulnerability Database / Zero-day / CVSS / Common Vulnerabilities and Exposures / Attack / Buffer overflow / Social vulnerability

    SOFTWARE – PRACTICE AND EXPERIENCE Softw. Pract. ExperPublished online in Wiley Online Library (wileyonlinelibrary.com). DOI: spe.2180 Analysis of operating system diversity for intrusion tolerance Mig

    Add to Reading List

    Source URL: www.di.fc.ul.pt

    Language: English - Date: 2013-01-18 09:24:08
    49Software bugs / Buffer overflow protection / Buffer overflow / Stack

    Pwning (sometimes) with style Dragons’ notes on CTFs Mateusz "j00ru" Jurczyk, Gynvael Coldwind Insomni’hack 2015, Geneva

    Add to Reading List

    Source URL: j00ru.vexillium.org

    Language: English - Date: 2015-03-20 05:43:43
    50Software engineering / Computing / Computer programming / Memory management / Software bugs / Programming language implementation / Functional languages / C++ / Pointer / C dynamic memory allocation / Buffer overflow protection / Optimizing compiler

    Portable Software Fault Isolation Joshua A. Kroll Computer Science Department Princeton University Princeton, NJ

    Add to Reading List

    Source URL: www.cs.princeton.edu

    Language: English - Date: 2014-05-10 07:53:45
    UPDATE