Back to Results
First PageMeta Content
Cyberwarfare / Buffer overflow protection / Stack buffer overflow / Buffer overflow / PaX / Address space layout randomization / Circular buffer / Pointer / Uncontrolled format string / Computing / Software bugs / Computer security


Breaking the memory secrecy assumption Raoul Strackx Yves Younan Pieter Philippaerts
Add to Reading List

Document Date: 2013-03-01 01:14:43


Open Document

File Size: 166,99 KB

Share Result on Facebook

City

San Antonio / Raleigh / Ottawa / Baltimore / Paris / Nuremberg / Las Vegas / Washington / D.C. / Miami Beach / Canary / San Diego / /

Company

IBM / Tokyo Research Laboratory / ACM Press / IEEE Press / /

Country

Germany / France / United States / Canada / /

Currency

USD / /

/

Facility

National Institute of Standards and Technology / Visual Studio / /

IndustryTerm

communications security / similar systems / everyday internet life / software instruction / marker processing vulnerability / /

OperatingSystem

Windows Vista / Mac OS X / Linux / FreeBSD / Microsoft Windows / Leopard / /

Organization

USENIX Association / National Institute of Standards and Technology / Free Software Foundation / Katholieke Universiteit Leuven / Address Space Layout Randomization ASLR / /

Person

Nathanael Paul / Hiroaki Etoh / Jonathan Walpole / Mark Dowd / Tyler Durden / Nora Sovarel / Aaron Grier / Dan Boneh / Angelos D. Keromytis / Wouter Joosen / Dave Maier / Darren Mutz / David Litchfield / Stephanie Forrest / Ben Pfaff / Matthew Page / David Evans / Perry Wagle / Kunikazu Yoda / Crispin Cowan / Steve Beattie / Qian Zhang / Derek Soeder / David H. Ackley / Frederik Valeur / R. Sekar / Eu J. Goh / Sandeep Bhatkar / Elena G. Barrantes / Phrack / Frank Piessens / William Robertson / Gerardo Richarte / Andreas Krennmair / Ryan F. Day / Hovav Shacham / Nagendra Modadugu / Eric Walthinsen / Peat Bakke / Daniel C. Duvarney / Alexander Sotirov / Yoav Weiss / Gaurav S. Kc / Steven Alexander / Darko Stefanovi / Brandon Bray / Dino D. Zovi / Calton Pu / Heather Hinton / Hans Van den Eynden / Christopher Kruegel / Vassilis Prevelakis / John Johansen / Yves Younan / Michael Howard / Tom Krazit / Sven Lachmund Thomas Walter Katholieke / Raoul Strackx Yves Younan Pieter / Jonathan Corbet / /

Position

General / Solar Designer / manager / the indirect pointer / memory manager / /

Product

SQL injection / /

ProgrammingLanguage

R / C / SQL / C++ / /

ProvinceOrState

Texas / Maryland / Nevada / Florida / North Carolina / California / Ontario / /

PublishedMedium

The USENIX Magazine / Lecture Notes in Computer Science / /

Technology

weak encryption / JPEG / Linux / operating systems / mobile devices / encryption / XOR encryption / /

URL

http /

SocialTag