Code injection

Results: 406



#Item
381Computer programming / Buffer overflow / Pointer / Address space layout randomization / Stack / Shellcode / C / Uncontrolled format string / Memory corruption / Computing / Software bugs / Software engineering

0 CPM: Masking Code Pointers to Prevent Code Injection Attacks PIETER PHILIPPAERTS, YVES YOUNAN, STIJN MUYLLE and FRANK PIESSENS, DistriNet Research Group, University of Leuven SVEN LACHMUND and THOMAS WALTER, DOCOMO Eu

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-11-05 16:02:36
382Software bugs / Buffer overflow / Memory safety / Heap overflow / Vulnerability / Uncontrolled format string / Pointer / Return-to-libc attack / Dangling pointer / Computing / Cyberwarfare / Computer security

Runtime countermeasures for code injection attacks against C and C++ programs YVES YOUNAN, WOUTER JOOSEN and FRANK PIESSENS Katholieke Universiteit Leuven The lack of memory-safety in C/C++ often leads to vulnerabilitie

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-02-27 15:05:36
383Software bugs / C Standard Library / System call / Buffer overflow protection / C dynamic memory allocation / Stack buffer overflow / Address space layout randomization / Return-to-libc attack / Pointer / Computing / Software engineering / Computer programming

JITSec: Just-in-time Security for Code Injection Attacks Willem De Groef, Nick Nikiforakis, Yves Younan, and Frank Piessens IBBT-DistriNet Katholieke Universiteit Leuven Celestijnenlaan 200A B3001

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-03-01 01:12:51
384Addressing mode / Shellcode / Instruction set / ARM architecture / Processor register / MOV / DEC Alpha / X86 / Machine code / Computer architecture / Computing / Instruction set architectures

J Comput Virol DOI[removed]s11416[removed]ORIGINAL PAPER Filter-resistant code injection on ARM

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-02-27 15:05:50
385Computer programming / Memory management / Computer memory / Buffer overflow / C++ / Pointer / Dangling pointer / C dynamic memory allocation / Heap overflow / Computing / Software bugs / Software engineering

A Methodology for Designing Countermeasures Against Current and Future Code Injection Attacks Yves Younan, Wouter Joosen, Frank Piessens DistriNet, Department of Computer Science Katholieke Universiteit Leuven Celestijne

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-02-25 04:08:30
386Software bugs / Stack buffer overflow / Buffer overflow / Pointer / Function prologue / Shellcode / Stack / C / Address space layout randomization / Computing / Software engineering / Computer programming

Code Pointer Masking: Hardening Applications against Code Injection Attacks Pieter Philippaerts1 , Yves Younan1 , Stijn Muylle1 , Frank Piessens1 , Sven Lachmund2 , and Thomas Walter2 1

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-02-27 15:06:43
387Central processing unit / Assembly languages / Software bugs / Shellcode / Addressing mode / ARM architecture / Instruction set / Processor register / MOV / Computer architecture / Computing / Instruction set architectures

Filter-resistant Code Injection on ARM Yves Younan Pieter Philippaerts Frank Piessens

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-03-01 01:15:37
388FireEye /  Inc. / Vulnerability / Common Vulnerabilities and Exposures / Cross-site request forgery / Cross-site scripting / Code injection / Arbitrary code execution / OpenSSL / Computer security / Cyberwarfare / Failure

Security Bulletin Revised July 8, 2014 FireEye Security Bulletin

Add to Reading List

Source URL: www.fireeye.com

Language: English - Date: 2014-07-08 17:06:03
389Emission standards / Air pollution / Air dispersion modeling / Sustainable transport / Title 40 of the Code of Federal Regulations / Engine / Two-stroke engine / Horsepower / Fuel injection / Internal combustion engine / Technology / Mechanical engineering

[removed]Federal Register / Vol. 65, No[removed]Tuesday, April 25, [removed]Rules and Regulations ENVIRONMENTAL PROTECTION AGENCY

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2010-12-01 13:27:39
390Relational database management systems / Computer network security / Database management systems / Hacking / Software testing / SQL injection / Cross-site scripting / Vulnerability / Code injection / Computing / Cyberwarfare / Computer security

How to Secure Your Website 5th Edition Approaches to Improve Web Application and Website Security

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2014-07-10 21:53:24
UPDATE