Buffer overflow

Results: 538



#Item
61Computer security / Buffer overflow / Heap overflow / Circular buffer / Integer overflow / Vulnerability / Code injection / Pointer / Stack overflow / Computing / Software bugs / Cyberwarfare

Microsoft Word - CWEs_as_vuln_theory.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-07-18 14:25:17
62Software testing / Computer network security / Hacking / Risk / Software bugs / Vulnerability / Social vulnerability / Buffer overflow / Database / Computer security / Cyberwarfare / Computing

=================================================================== PLOVER - Preliminary List Of Vulnerability Examples for Researchers =================================================================== [*] Author: Stev

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:16
63Security / Software testing / Hacking / Vulnerability / CVSS / Security testing / Buffer overflow / Attack / Uncontrolled format string / Cyberwarfare / Computer security / Computer network security

Microsoft Word - unforgivable 3.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-09-13 16:51:18
64Orthography / English orthography / Occitan phonology / Linguistics / English phonology / Language

B u ffe r o ve rflo w A buffer overflow condition exists when a program attem pts to put m ore data in a buffer than it can hold or when a program attem pts to put data in a m em ory area past a buffer. In this case, a b

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:15
65Software bugs / C Standard Library / Stack buffer overflow / Buffer overflow / Subroutines / Address space layout randomization / Return-to-libc attack / NX bit / Pointer / Computing / Software engineering / Computer programming

2013 IEEE Symposium on Security and Privacy Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

Add to Reading List

Source URL: wwwx.cs.unc.edu

Language: English - Date: 2014-09-05 15:38:44
66Software bugs / Malware / PaX / Buffer overflow / Return-to-libc attack / Vulnerability / Address space layout randomization / Computer virus / Subroutine / Computing / Computer programming / Software engineering

Program Differentiation-INTERACT-2010-v6-publish

Add to Reading List

Source URL: www.cs.fsu.edu

Language: English - Date: 2010-02-17 09:21:07
67Abstract data types / Subroutines / Stack / Pointer / Linked list / Queue / C / Call stack / Stack buffer overflow / Software engineering / Computing / Computer programming

Data Structures David Morgan A list

Add to Reading List

Source URL: homepage.smc.edu

Language: English - Date: 2014-05-03 04:37:46
68Computer programming / Buffer overflow protection / Stack buffer overflow / Buffer overflow / Stack / C standard library / Pointer / C / Subroutine / Computing / Software bugs / Software engineering

The following paper was originally published in the Proceedings of the 7th USENIX Security Symposium San Antonio, Texas, January 26-29, 1998 StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Atta

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2002-04-30 18:05:07
69Software testing / Hacking / Relational database management systems / Database management systems / Attack patterns / SQL injection / Vulnerability / Code injection / Buffer overflow / Cyberwarfare / Computing / Computer security

CWECWE/SANS Top 25 Most Dangerous Software Errors

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2012-09-25 15:14:33
70

Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

Add to Reading List

Source URL: www.scs.stanford.edu

- Date: 2014-05-19 16:48:47
    UPDATE