<--- Back to Details
First PageDocument Content
Software engineering / Buffer overflow / Heap overflow / Stack buffer overflow / Memory corruption / Improper input validation / Stack / Software bugs / Software quality / Computing
Date: 2008-05-24 13:54:57
Software engineering
Buffer overflow
Heap overflow
Stack buffer overflow
Memory corruption
Improper input validation
Stack
Software bugs
Software quality
Computing

Argos: The High-Interaction back-end Honeypot of NoAH

Add to Reading List

Source URL: www.fp6-noah.org

Download Document from Source Website

File Size: 606,35 KB

Share Document on Facebook

Similar Documents

Heap and BSS Overflow Ⅱ Arbro on-02-19

DocID: 1uD4u - View Document

Computer security / Computing / Cyberwarfare / Software bugs / Computer errors / Shellcode / Buffer overflow / Return-oriented programming / Heap overflow / Address space layout randomization / Symbolic execution / Exploit

doi:The idea is to identify security-critical software bugs so they can be fixed first. By Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumle

DocID: 1qEiC - View Document

Computing / Software engineering / Software bugs / Computer programming / Computer memory / C standard library / Address space layout randomization / Buffer overflow / Heap overflow / C dynamic memory allocation / Pointer / Memory safety

Data Randomization Cristian Cadar Microsoft Research Cambridge, UK

DocID: 1qxLg - View Document

Software bugs / Computing / Software engineering / Computer programming / Computer errors / Subroutines / Memory management / Stack / Buffer overflow / Call stack / Stack buffer overflow

b The heap sucks The Stack is Back – Jon Oberheide

DocID: 1pRdF - View Document

Web browsers / Pwn2Own / Hacking / Vulnerability / Safari / Heap spraying / Google Chrome / Exploit / Buffer overflow / Arbitrary code execution / Internet Explorer / Privilege escalation

$hell on Earth: From Browser to System Compromise Matt Molinyawe, Abdul-Aziz Hariri, and Jasiel Spelman A Zero Day Initiative Research Paper

DocID: 1p8BX - View Document