Buffer overflow

Results: 538



#Item
511Computer programming / Stack buffer overflow / Buffer overflow protection / Buffer overflow / Stack / Call stack / Subroutine / Pointer / Return-to-libc attack / Software bugs / Computing / Software engineering

Enlisting Hardware Architecture to Thwart Malicious Code Injection Ruby B. Lee, David K. Karig, John P. McGregor, and Zhijie Shi

Add to Reading List

Source URL: palms.ee.princeton.edu

Language: English - Date: 2004-07-02 15:00:06
512Software quality / Stack buffer overflow / Buffer overflow / Heap overflow / Pointer / Shellcode / Stack / Circular buffer / C dynamic memory allocation / Computing / Software bugs / Software engineering

Attacking Systems Beyond Stack Smashing:

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2013-04-08 13:37:56
513Shellcode / Computer errors / Heap overflow / Circular buffer / C dynamic memory allocation / Segmentation fault / OllyDbg / Computing / Memory management / Computer programming

Exploiting the MSRPC Heap Overflow – Part I Dave Aitel Sep 11, 2003

Add to Reading List

Source URL: www.immunitysec.com

Language: English - Date: 2012-01-03 08:49:04
514Memory management / Software bugs / Data types / Heap overflow / Shellcode / Buffer overflow / C dynamic memory allocation / Pointer / C / Computing / Software engineering / Computer programming

Defeating Microsoft Windows XP SP2 Heap protection and DEP bypass Alexander Anisimov, Positive Technologies.

Add to Reading List

Source URL: www.ptsecurity.com

Language: English - Date: 2012-03-01 08:37:03
515C programming language / C++ / C Standard Library / Character encoding / Primitive types / C / Buffer overflow / String / SQL / Computing / Software engineering / Computer programming

SC22 WG14 N1173 Rationale for TR 24731

Add to Reading List

Source URL: www.open-std.org

Language: English - Date: 2006-04-29 10:33:28
516Machine code / X86 instructions / X86 architecture / X86 / Pin / Buffer overflow protection / Assembly language / INT / Shellcode / Computer architecture / Computing / Software bugs

Control-Flow Integrity Principles, Implementations, and Applications Mart´ın Abadi

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2005-09-14 14:11:39
517X86 architecture / X86 instructions / Assembly languages / Memory management / Segmentation fault / Pointer / MOV / Virtual address space / Buffer overflow / Computing / Computer architecture / Software engineering

http://www.nologin.org Safely Searching Process Virtual Address Space

Add to Reading List

Source URL: www.hick.org

Language: English - Date: 2007-08-26 07:19:33
518Call graph / Call stack / Computability / Buffer overflow / Lua / Software / Computing / Stack

Intrusion Detection via Static Analysis David Wagner

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2013-04-08 13:37:49
519C Standard Library / Software bugs / X86 architecture / Central processing unit / Memory management / Return-to-libc attack / PaX / Return-oriented programming / Buffer overflow / Computing / Computer programming / Computer security

kBouncer: Efficient and Transparent ROP Mitigation Vasilis Pappas Columbia University

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2012-08-05 22:16:20
520Central processing unit / Subroutines / Software bugs / Calling convention / Call stack / Buffer overflow protection / Register window / Function prologue / Stack buffer overflow / Computing / Computer architecture / Software engineering

PDF Document

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2008-08-13 23:28:17
UPDATE