Buffer overflow protection

Results: 81



#Item
1Preventing memory error exploits with WIT Periklis Akritidis ∗ Cristian Cadar∗ Costin Raiciu∗ Manuel Costa

Preventing memory error exploits with WIT Periklis Akritidis ∗ Cristian Cadar∗ Costin Raiciu∗ Manuel Costa

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2016-03-08 07:04:45
2Department of Electrical Engineering and Computer Science  MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
3CFIMon: Detecting Violation of Control Flow Integrity using Performance Counters Yubin Xia† ‡, Yutao Liu† ‡, Haibo Chen†, Binyu Zang‡ †Institute of Parallel and Distributed Systems, Shanghai Jiao Tong Unive

CFIMon: Detecting Violation of Control Flow Integrity using Performance Counters Yubin Xia† ‡, Yutao Liu† ‡, Haibo Chen†, Binyu Zang‡ †Institute of Parallel and Distributed Systems, Shanghai Jiao Tong Unive

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2012-08-23 22:16:01
4Code-Pointer Integrity Volodymyr Kuznetsov∗ , L´aszl´o Szekeres‡ , Mathias Payer†,§ George Candea∗ , R. Sekar‡ , Dawn Song† ∗ Ecole ´ † UC

Code-Pointer Integrity Volodymyr Kuznetsov∗ , L´aszl´o Szekeres‡ , Mathias Payer†,§ George Candea∗ , R. Sekar‡ , Dawn Song† ∗ Ecole ´ † UC

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
5Retrospective Protection utilizing Binary Rewriting Sergej Proskurin, Fatih Kilic, Claudia Eckert1 Abstract: Buffer overflow vulnerabilities present a common threat. To encounter this issue, operating system support and

Retrospective Protection utilizing Binary Rewriting Sergej Proskurin, Fatih Kilic, Claudia Eckert1 Abstract: Buffer overflow vulnerabilities present a common threat. To encounter this issue, operating system support and

Add to Reading List

Source URL: www.sec.in.tum.de

Language: English - Date: 2015-06-23 06:38:59
6Pwning (sometimes) with style Dragons’ notes on CTFs Mateusz

Pwning (sometimes) with style Dragons’ notes on CTFs Mateusz "j00ru" Jurczyk, Gynvael Coldwind Insomni’hack 2015, Geneva

Add to Reading List

Source URL: j00ru.vexillium.org

Language: English - Date: 2015-03-20 05:43:43
7Portable Software Fault Isolation Joshua A. Kroll Computer Science Department Princeton University Princeton, NJ

Portable Software Fault Isolation Joshua A. Kroll Computer Science Department Princeton University Princeton, NJ

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2014-05-10 07:53:45
8Relative Vulnerability: An Empirical Assurance Metric Crispin Cowan, PhD CTO, Immunix

Relative Vulnerability: An Empirical Assurance Metric Crispin Cowan, PhD CTO, Immunix

Add to Reading List

Source URL: adam.shostack.org

Language: English - Date: 2014-06-11 11:49:30
9The following paper was originally published in the Proceedings of the 7th USENIX Security Symposium San Antonio, Texas, January 26-29, 1998 StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Atta

The following paper was originally published in the Proceedings of the 7th USENIX Security Symposium San Antonio, Texas, January 26-29, 1998 StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Atta

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2002-04-30 18:05:07
10CSRuntime Defenses Scribe Notes – Ashima Atul) Runtime Instrumentation Techniques All runtime instrumentation techniques protect the integrity of the application. They can be exploited by Denial-of-Servic

CSRuntime Defenses Scribe Notes – Ashima Atul) Runtime Instrumentation Techniques All runtime instrumentation techniques protect the integrity of the application. They can be exploited by Denial-of-Servic

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:42