Buffer overflow

Results: 538



#Item
1

‫رشح مقدمة يف‬ EggHunter Buffer Overflow for Windows Haboob-Team

Add to Reading List

Source URL: www.exploit-db.com

Language: Arabic - Date: 2018-06-12 07:45:16
    2

    B u ffe r o ve rflo w A buffer overflow condition exists when a program attem pts to put m ore data in a buffer than it can hold or when a program attem pts to put data in a m em ory area past a buffer. In this case, a b

    Add to Reading List

    Source URL: cwe.mitre.org

    Language: English - Date: 2006-09-13 14:57:15
      3

      A Dynamic Mechanism for Recovering from Buffer Overflow Attacks Stelios Sidiroglou, Giannis Giovanidis, and Angelos D. Keromytis Department of Computer Science, Columbia University, USA {stelios,ig2111,angelos}@cs.columb

      Add to Reading List

      Source URL: www.cs.columbia.edu

      - Date: 2005-07-04 12:57:42
        4Computing / Computer security / Software bugs / Address space layout randomization / Gadget / Buffer overflow / Return-to-libc attack / Shellcode / Instruction selection / Position-independent code / NOP / Return-oriented programming

        Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

        Add to Reading List

        Source URL: users.ece.cmu.edu

        Language: English - Date: 2014-05-29 15:38:01
        5Software bugs / Computer programming / Software engineering / Computing / Buffer overflow / Stack / Arbitrary code execution / Subroutine / Stack buffer overflow

        Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I

        Add to Reading List

        Source URL: css.csail.mit.edu

        Language: English - Date: 2016-01-29 11:50:05
        6Software bugs / Computing / Software engineering / Computer programming / Buffer overflow / C dynamic memory allocation / Integer overflow / Pointer

        Phasing out UNIX beforeUNIX and C are obsolete Andreas Bogk and Hannes Mehnert What The Hack,

        Add to Reading List

        Source URL: berlin.ccc.de

        Language: English - Date: 2005-08-11 11:49:44
        7Computing / Software engineering / Computer programming / Software bugs / X86 architecture / Buffer overflow / Computer memory / X86-64 / Return-to-libc attack / X86 / Return-oriented programming / NX bit

        Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

        Add to Reading List

        Source URL: css.csail.mit.edu

        Language: English - Date: 2016-01-29 11:50:05
        8Computer security / Computing / Cyberwarfare / Software bugs / Computer errors / Shellcode / Buffer overflow / Return-oriented programming / Heap overflow / Address space layout randomization / Symbolic execution / Exploit

        doi:The idea is to identify security-critical software bugs so they can be fixed first. By Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumle

        Add to Reading List

        Source URL: users.ece.cmu.edu

        Language: English - Date: 2014-05-29 15:38:01
        9Computing / Computer errors / Computer memory / Server / Server hardware / Buffer overflow / Sendmail / Error detection and correction / Segmentation fault / Exception handling / Bounds checking / Transmission Control Protocol

        Enhancing Server Availability and Security Through Failure-Oblivious Computing Martin Rinard, Cristian Cadar, Daniel Dumitran, Daniel M. Roy, Tudor Leu, and William S. Beebee, Jr. Computer Science and Artificial Intellig

        Add to Reading List

        Source URL: www.doc.ic.ac.uk

        Language: English - Date: 2016-03-08 07:04:45
        10Computing / Software engineering / Software bugs / Computer programming / Computer memory / C standard library / Address space layout randomization / Buffer overflow / Heap overflow / C dynamic memory allocation / Pointer / Memory safety

        Data Randomization Cristian Cadar Microsoft Research Cambridge, UK

        Add to Reading List

        Source URL: www.doc.ic.ac.uk

        Language: English - Date: 2016-03-08 07:04:45
        UPDATE