<--- Back to Details
First PageDocument Content
Central processing unit / Subroutines / Software bugs / Calling convention / Call stack / Buffer overflow protection / Register window / Function prologue / Stack buffer overflow / Computing / Computer architecture / Software engineering
Date: 2008-08-13 23:28:17
Central processing unit
Subroutines
Software bugs
Calling convention
Call stack
Buffer overflow protection
Register window
Function prologue
Stack buffer overflow
Computing
Computer architecture
Software engineering

Add to Reading List

Source URL: cseweb.ucsd.edu

Download Document from Source Website

File Size: 193,22 KB

Share Document on Facebook

Similar Documents

Software engineering / Computing / Computer programming / Data types / Primitive types / Software bugs / Assembly languages / Computer performance / Pointer / X86 assembly language / Subroutine / Buffer overflow protection

Preventing memory error exploits with WIT Periklis Akritidis ∗ Cristian Cadar∗ Costin Raiciu∗ Manuel Costa

DocID: 1q5Ky - View Document

Software bugs / Buffer overflow protection / Buffer overflow / Return-to-libc attack / Stack / Subroutine / C standard library / Stack buffer overflow / Return-oriented programming

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

DocID: 1oK9c - View Document

Central processing unit / Machine code / Software bugs / Return-oriented programming / Computer memory / Instruction set architectures / Buffer overflow protection / Self-modifying code / Subroutine / Stack / Return-to-libc attack / Instruction set

CFIMon: Detecting Violation of Control Flow Integrity using Performance Counters Yubin Xia† ‡, Yutao Liu† ‡, Haibo Chen†, Binyu Zang‡ †Institute of Parallel and Distributed Systems, Shanghai Jiao Tong Unive

DocID: 1odF8 - View Document

Software engineering / Computing / Computer programming / Software bugs / Data types / Memory management / Primitive types / Programming language implementation / Pointer / Memory safety / Dangling pointer / Buffer overflow protection

Code-Pointer Integrity Volodymyr Kuznetsov∗ , L´aszl´o Szekeres‡ , Mathias Payer†,§ George Candea∗ , R. Sekar‡ , Dawn Song† ∗ Ecole ´ † UC

DocID: 1o3Br - View Document

Computing / Software / Software bugs / Programming language implementation / Subroutines / Portable Executable / Position-independent code / Object file / Dynamic linker / Stack buffer overflow / Buffer overflow / Return-to-libc attack

Retrospective Protection utilizing Binary Rewriting Sergej Proskurin, Fatih Kilic, Claudia Eckert1 Abstract: Buffer overflow vulnerabilities present a common threat. To encounter this issue, operating system support and

DocID: 1mDhJ - View Document