Buffer

Results: 4742



#Item
351Computing / Software / Computer architecture / Software bugs / Computing platforms / Address space layout randomization / C standard library / PaX / Buffer overflow / Stack buffer overflow / Linux / Android

Curriculum Vitae Name: Current: Studies: Address:

Add to Reading List

Source URL: hmarco.org

Language: English - Date: 2016-04-07 10:01:31
352Heap spraying / Heap overflow / Shellcode / C++ / Heap feng shui / Alexander Sotirov / C dynamic memory allocation / Heap / Software bugs / JavaScript / NOP slide / Buffer overflow

風水 Heap Feng Shui in JavaScript Alexander Sotirov Introduction

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:17
353Software bugs / Buffer overflow / Open Source Vulnerability Database / Computer security / Computer memory / Morris worm / Memory corruption / Vulnerability / Computer worm / Blackhat

Memory Corruption Attacks The (almost) Complete History thinkst applied research haroon meer

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:53:12
354

1 On the effectiveness of NX, SSP, RenewSSP and ASLR against stack buffer overflows Hector Marco-Gisbert, Ismael Ripoll Departamento de Inform´atica de Sistemas y Computadores. Universitat Polit`ecnica de Val`encia

Add to Reading List

Source URL: renewssp.com

Language: English - Date: 2015-07-24 11:44:08
    355Computing / Software bugs / Software engineering / Blind return oriented programming / Computer errors / Return-oriented programming / Stack buffer overflow / Return-to-libc attack / Address space layout randomization / Buffer overflow / Shellcode / Stack

    Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

    Add to Reading List

    Source URL: www.scs.stanford.edu

    Language: English - Date: 2016-01-02 20:09:14
    356

    Buffers Buffer objects are similar to BLOB (binary large objects). Wakanda proposes two specific methods allowing you to convert easily objects from one type to the other: toBlob( ) and toBuffer( ). Buffer objects allow

    Add to Reading List

    Source URL: download.wakanda.org

    Language: English - Date: 2013-11-22 08:33:19
      357

      On the Effect of Router Buffer Sizes on Low-Rate Denial of Service Attacks Sandeep Sarat Andreas Terzis Johns Hopkins University

      Add to Reading List

      Source URL: www.cs.jhu.edu

      Language: English - Date: 2005-07-30 00:37:15
        358

        Modular Checking for Buffer Overflows in the Large Brian Hackett Manuvir Das, Daniel Wang, Zhe Yang Computer Science Department

        Add to Reading List

        Source URL: research.microsoft.com

        Language: English - Date: 2005-10-17 18:14:56
          359Computing / Computer hardware / Computer architecture / Memory management / Virtual memory / Computer memory / Inputoutput memory management unit / X86 virtualization / Direct memory access / Shared memory / Remote direct memory access / Translation lookaside buffer

          Active Access: A Mechanism for High-Performance Distributed Data-Centric Computations Maciej Besta Torsten Hoefler

          Add to Reading List

          Source URL: spcl.inf.ethz.ch

          Language: English - Date: 2015-04-19 21:19:08
          360

          On the effectiveness of NX, SSP, RenewSSP and ASLR against stack buffer overflows Hector Marco On the effectiveness of NX, SSP, RenewSSP and ASLR against stack buffer overflows

          Add to Reading List

          Source URL: renewssp.com

          Language: English - Date: 2015-07-24 11:46:04
            UPDATE