Dangling pointer

Results: 65



#Item
11FreeSentry:	
  protecting	
  against	
  use-­‐ after-­‐free	
  vulnerabilities	
  due	
  to	
   dangling	
  pointers Yves	
  Younan,	
  Senior	
  Research	
  Engineer	
   Talos	
  Security	
  Intelli

FreeSentry:  protecting  against  use-­‐ after-­‐free  vulnerabilities  due  to   dangling  pointers Yves  Younan,  Senior  Research  Engineer   Talos  Security  Intelli

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2015-03-27 04:18:58
12ACSL Version 1.6 Implementation in Oxygen ACSL: ANSI/ISO C Specication Language Version 1.6  Oxygen

ACSL Version 1.6 Implementation in Oxygen ACSL: ANSI/ISO C Specication Language Version 1.6  Oxygen

Add to Reading List

Source URL: frama-c.com

Language: English - Date: 2013-09-24 04:53:01
13ACSL Version 1.8 Implementation in Neon ACSL: ANSI/ISO C Specication Language Version 1.8  Neon

ACSL Version 1.8 Implementation in Neon ACSL: ANSI/ISO C Specication Language Version 1.8  Neon

Add to Reading List

Source URL: frama-c.com

Language: English - Date: 2014-03-12 13:10:15
14In the Proceedings of the 39th International Symposium on Computer Architecture (ISCAWatchdog: Hardware for Safe and Secure Manual Memory Management and Full Memory Safety Santosh Nagarakatte

In the Proceedings of the 39th International Symposium on Computer Architecture (ISCAWatchdog: Hardware for Safe and Secure Manual Memory Management and Full Memory Safety Santosh Nagarakatte

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2012-05-03 14:35:31
15

PDF Document

Add to Reading List

Source URL: frama-c.com

Language: English - Date: 2013-09-24 04:53:00
16Understanding the heap by breaking it A case study of the heap as a persistent data structure through nontraditional exploitation techniques Abstract: Traditional exploitation techniques of overwriting heap metadata has

Understanding the heap by breaking it A case study of the heap as a persistent data structure through nontraditional exploitation techniques Abstract: Traditional exploitation techniques of overwriting heap metadata has

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:38
17Safe Manual Memory Management David Gay Rob Ennals  Eric Brewer

Safe Manual Memory Management David Gay Rob Ennals Eric Brewer

Add to Reading List

Source URL: www.barnowl.org

Language: English - Date: 2007-09-04 14:28:00
18Ironclad C++ A Library-Augmented Type-Safe Subset of C++ Christian DeLozier Richard Eisenberg Santosh Nagarakatte†

Ironclad C++ A Library-Augmented Type-Safe Subset of C++ Christian DeLozier Richard Eisenberg Santosh Nagarakatte†

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2013-09-17 20:34:39
19Dangling Pointer  Jonathan Afek, 2/8/07, BlackHat USA 1

Dangling Pointer Jonathan Afek, 2/8/07, BlackHat USA 1

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
20ACSL Version 1.7 Implementation in Fluorine ACSL: ANSI/ISO C Specication Language Version 1.7  Fluorine

ACSL Version 1.7 Implementation in Fluorine ACSL: ANSI/ISO C Specication Language Version 1.7  Fluorine

Add to Reading List

Source URL: frama-c.com

Language: English - Date: 2013-09-24 04:53:00