Buffer overflow

Results: 538



#Item
71Software quality / Vulnerability / Buffer overflow / Stack buffer overflow / C dynamic memory allocation / Malware / C / Stack / Computing / Software bugs / Software engineering

Poster: Targeted Therapy for Program Bugs Qiang Zeng Mingyi Zhao Peng Liu

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-05-07 16:20:28
72Software bugs / Subroutines / C Standard Library / Return-to-libc attack / Control flow / Stack buffer overflow / Buffer overflow / Address space layout randomization / JMP / Computing / Software engineering / Computer programming

Out Of Control: Overcoming Control-Flow Integrity Enes Gökta¸s∗ Elias Athanasopoulos† Vrije Universiteit

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-04-21 13:48:10
73Internet / DNS rebinding / Cross-site request forgery / HTTP cookie / Firewall / Stack buffer overflow / Denial-of-service attack / Firefox / Malware / Computing / Computer network security / Software

CS 155: Spring 2014 June 9, 2014 CS 155 Final Exam This exam is open book and open notes. You may use course notes and documents that you have stored on a laptop, but you may NOT use the network connection on your laptop

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-05-18 15:16:38
74Software bugs / Shellcode / Len Sassaman / Buffer overflow / USENIX / ;login: / Address space layout randomization / RSA / David Brumley / Cryptography / Cyberwarfare / Computer security

The Danger of Unrandomized Code EDWAR D J . SCHWART Z Of Headless User Accounts and Restricted Shells JAN SCHAUMANN

Add to Reading List

Source URL: www.usenix.org

Language: English
75Software bugs / C Standard Library / Computer errors / OpenBSD / Memory management / Buffer overflow protection / Buffer overflow / Stack buffer overflow / C dynamic memory allocation / Computing / Computer programming / Software engineering

CSRuntime Defenses Scribe Notes – Ashima Atul) Runtime Instrumentation Techniques All runtime instrumentation techniques protect the integrity of the application. They can be exploited by Denial-of-Servic

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:42
76Software bugs / C POSIX library / Computer errors / Stack buffer overflow / Buffer overflow / Write / Stack / Uncontrolled format string / Sizeof / Computing / Software engineering / Computer programming

CS 161 Fall 2005 Computer Security

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2005-12-11 05:02:06
77Computer programming / Dangling pointer / Pointer / Stack buffer overflow / Debugging / Memory leak / Lock / Buffer overflow / C dynamic memory allocation / Computing / Software bugs / Software engineering

ConMem: Detecting Severe Concurrency Bugs through an Effect-Oriented Approach Wei Zhang Chong Sun

Add to Reading List

Source URL: people.cs.uchicago.edu

Language: English - Date: 2010-01-19 14:05:40
78ITunes / Multi-touch / IPhone / Smartphones / IOS / Social vulnerability / Buffer overflow / Heap overflow / IPod Touch / Computing / Apple Inc. / Software

security research Core GraphicsMemory Corruption CVEPDF Indexed colorspace buffer overflow Apple CoreGraphics library fails to validate the input when parsing the colorspace specification of a PDF XObject res

Add to Reading List

Source URL: www.binamuse.com

Language: English
79C++ / C Standard Library / C dynamic memory allocation / Memory management / Heap overflow / Circular buffer / C / Sizeof / D-ary heap / Computing / Computer programming / Software engineering

Glibc Adventures - The Forgotten Chunks

Add to Reading List

Source URL: www.contextis.com

Language: English - Date: 2015-06-05 11:57:30
80Software bugs / Computer errors / C Standard Library / Control flow / Buffer overflow / Segmentation fault / Printf format string / NOP / Calling convention / Computing / Software engineering / X86 instructions

15-213, Fall 20xx Lab Assignment L3: The Buffer Bomb Assigned: XXX, Due: XXX Last Possible Time to Turn in: XXX Harry Bovik () is the lead person for this assignment.

Add to Reading List

Source URL: csapp.cs.cmu.edu

Language: English - Date: 2014-09-11 12:11:29
UPDATE