Buffer overflow

Results: 538



#Item
51Computer memory / Computing / Software bugs / Software engineering / Cyberwarfare / Buffer overflow / Program analysis / Control flow graph / Data buffer / Data-flow analysis / Vulnerability

Transformation-aware Exploit Generation using a HICFG Dan Caselden Alex Bazhanyuk Mathias Payer Laszlo Szekeres

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2013-05-16 23:27:09
52Computing / Computer architecture / Memory management / Software bugs / POSIX / Process / C standard library / Exit / Stack buffer overflow / Pointer / Segmentation fault / Stack

.oO Phrack 49 Oo. Volume Seven, Issue Forty­Nine File 14 of 16 BugTraq, r00t, and Underground.Org  bring you Smashing The Stack For Fun And Profit

Add to Reading List

Source URL: inst.eecs.berkeley.edu

Language: English - Date: 2008-08-26 17:57:09
53Cyberwarfare / Computer security / Security / Computer network security / Software testing / Software bugs / Hacking / Vulnerability / Buffer overflow protection / Exploit / Attack

Relative Vulnerability: An Empirical Assurance Metric Crispin Cowan, PhD CTO, Immunix

Add to Reading List

Source URL: adam.shostack.org

Language: English - Date: 2014-06-11 11:49:30
54Computing / Computer errors / Application checkpointing / Parallel computing / Crash / Synchronization / Data corruption / Exception handling / Checkpoint / Segmentation fault / Virtualization / Buffer overflow

Self-Healing Multitier Architectures Using Cascading Rescue Points Angeliki Zavou, Georgios Portokalidis, Angelos D. Keromytis Department of Computer Science Columbia University, New York, NY, USA {azavou, porto, angelos

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2013-01-22 23:52:05
55

Microsoft PowerPoint - lec9-buffer-overflow

Add to Reading List

Source URL: inst.eecs.berkeley.edu

Language: English - Date: 2008-09-29 13:52:45
    56Software bugs / Computer errors / Memory management / System calls / Process / Sigreturn-oriented programming / Return-oriented programming / Stack buffer overflow / Buffer overflow / Address space layout randomization / Shellcode / Segmentation fault

    Framing Signals—A Return to Portable Shellcode Erik Bosman Vrije Universiteit Amsterdam

    Add to Reading List

    Source URL: www.cs.vu.nl

    Language: English - Date: 2014-03-24 10:31:12
    57Computer security / Cyberwarfare / Computing / Software bugs / Computer worms / Computer network security / Witty / Hacking / Software testing / Buffer overflow / Stack buffer overflow / SQL Slammer

    reflections on witty by Nicholas Weaver Nicholas Weaver is a postdoctoral researcher at the

    Add to Reading List

    Source URL: www1.icsi.berkeley.edu

    Language: English - Date: 2012-09-26 16:43:03
    58

    Buffer Overflow En Windows Curso de francés avanzado INDICE INTRODUCCION

    Add to Reading List

    Source URL: ns2.elhacker.net

    Language: Spanish - Date: 2011-12-24 13:28:14
      59Disk encryption / Windows Vista / Computer network security / Cryptographic software / Data security / Firewall / USB flash drive / Buffer overflow / BitLocker / Security and safety features new to Windows Vista

      PDF Document

      Add to Reading List

      Source URL: www.nebraskacert.org

      Language: English - Date: 2008-05-16 20:02:09
      60Software bugs / Computer errors / Debuggers / GNU Debugger / Shellcode / Python / Stack buffer overflow / Buffer overflow / .py / Computing / Software / Computer programming

      EECS 388 Intro to Computer Security October 24, 2014 Project 4: Application Security

      Add to Reading List

      Source URL: www.eecs.umich.edu

      Language: English - Date: 2014-12-24 15:06:41
      UPDATE