Computer security software

Results: 11097



#Item
601Computing / Software engineering / Computer programming / C standard library / Software bugs / Computer security / Memory management / Subroutines / Control-flow integrity / Call stack / Stack buffer overflow / Setjmp.h

Control-Flow Bending: On the Effectiveness of Control-Flow Integrity Nicolas Carlini UC Berkeley Antonio Barresi

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
602Computing / Software / Computer architecture / Smartphones / Cloud clients / Computing platforms / Mobile operating systems / Personal computing / Android / Tablet computer / Rooting / Linux

IEEE Symponsium on Security and Privacy, San Jose, CA, MayThe Peril of Fragmentation: Security Hazards in Android Device Driver Customizations Xiaoyong Zhou∗ , Yeonjoon Lee∗ , Nan Zhang∗ , Muhammad Naveed†

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2014-05-08 03:51:49
603Software / Computing / Computer architecture / Smartphones / Mobile operating systems / Social networking services / Android / Mobile security / Twitter / Here WeGo / IOS / Mobile deep linking

Identity, Location, Disease and More: Inferring Your Secrets from Android Public Resources Xiaoyong Zhou1 , Soteris Demetriou2 , Dongjing He2 , Muhammad Naveed2 , Xiaorui Pan1 , XiaoFeng Wang1 , Carl A. Gunter2 , Klara N

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2014-05-08 03:51:04
604Security / Computer security / Prevention / Cyberwarfare / Crime prevention / Cryptography / National security / Federal Information Security Management Act

Earth System Grid Federation (ESGF) Software Security Plan

Add to Reading List

Source URL: esgf.llnl.gov

Language: English - Date: 2016-06-01 13:26:15
605Computing / Computer security / Software / Autobahn / Installation / Proxy server / Firewall

Microsoft Word - Autobahn Toolbar + Execution Apps Installation Guide v1.3

Add to Reading List

Source URL: autobahn.db.com

Language: English - Date: 2016-05-10 06:39:16
606Computer security / Cyberwarfare / Cybercrime / Address space layout randomization / Return-oriented programming / Vulnerability / Code injection / Software bugs / JIT spraying / PaX

String Oriented Programming: When ASLR is not enough Mathias Payer* and Thomas R. Gross Department of Computer Science ETH Zürich, Switzerland

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
607Videotelephony / Computer-mediated communication / Teleconferencing / Technology / Web conferencing / Computing / Remote administration software / WebEx / Cisco Systems / Videoconferencing / Teleconference / Password

White Paper Web Conferencing: Unleash the Power of Secure, Real-Time Collaboration This paper focuses on security information for Cisco WebEx Meeting Center, Cisco WebEx Training Center, Cisco WebEx Support Center, and

Add to Reading List

Source URL: www.webex.com

Language: English - Date: 2016-04-06 00:43:01
608Software engineering / Computing / Computer programming / Data types / Software bugs / Pointer / Memory safety / Stack buffer overflow / Dangling pointer / C dynamic memory allocation / Cyclone / Buffer overflow

IEEE SECURITY& PRIVACY Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
609Computer security / Cyberwarfare / Computing / Hacking / Computer network security / Software testing / Vulnerability / CERT Coordination Center / Cross-site scripting / SQL injection / CVSS / Benjamin Kunz Mejri

Reporting Status of Vulnerability-related Information about Software Products and Websites - 1st Quarter ofJanuary – March) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency Res

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2016-05-31 02:00:13
610Computer architecture / Software / Computing / Operating system kernels / Linux kernel / Computer security / Control-flow integrity / Kernel / System call / Protection ring / MINIX 3 / Microkernel

Fine-Grained Control-Flow Integrity for Kernel Software Xinyang Ge∗ , Nirupama Talele∗ , Mathias Payer† , and Trent Jaeger∗ ∗ The Pennsylvania State University

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
UPDATE