Dangling pointer

Results: 65



#Item
21DANGLING POINTER SMASHING THE POINTER FOR FUN AND PROFIT JONATHAN AFEK ADI SHARABANI A whitepaper from Watchfire

DANGLING POINTER SMASHING THE POINTER FOR FUN AND PROFIT JONATHAN AFEK ADI SHARABANI A whitepaper from Watchfire

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
22FreeSentry:	
  protecting	
  against	
  use-­‐ after-­‐free	
  vulnerabilities	
  due	
  to	
   dangling	
  pointers Yves	
  Younan,	
  Senior	
  Research	
  Engineer	
   Talos	
  Security	
  Intelli

FreeSentry:  protecting  against  use-­‐ after-­‐free  vulnerabilities  due  to   dangling  pointers Yves  Younan,  Senior  Research  Engineer   Talos  Security  Intelli

Add to Reading List

Source URL: fort-knox.org

Language: English - Date: 2015-03-28 05:13:13
23FreeSentry: Protecting Against Use-After-Free Vulnerabilities Due to Dangling Pointers Yves Younan Talos Security Intelligence and Research Group Cisco Systems

FreeSentry: Protecting Against Use-After-Free Vulnerabilities Due to Dangling Pointers Yves Younan Talos Security Intelligence and Research Group Cisco Systems

Add to Reading List

Source URL: fort-knox.org

Language: English - Date: 2015-02-07 13:10:31
24FreeSentry:	
  protecting	
  against	
  use-­‐ after-­‐free	
  vulnerabilities	
  due	
  to	
   dangling	
  pointers Yves	
  Younan,	
  Senior	
  Research	
  Engineer	
   Talos	
  Security	
  Intelli

FreeSentry:  protecting  against  use-­‐ after-­‐free  vulnerabilities  due  to   dangling  pointers Yves  Younan,  Senior  Research  Engineer   Talos  Security  Intelli

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2015-03-27 04:18:58
25SoK: Eternal War in Memory L´aszl´o Szekeres† , Mathias Payer‡ , Tao Wei∗‡ , Dawn Song‡ † Stony Brook University ‡ University of California, Berkeley ∗ Peking University

SoK: Eternal War in Memory L´aszl´o Szekeres† , Mathias Payer‡ , Tao Wei∗‡ , Dawn Song‡ † Stony Brook University ‡ University of California, Berkeley ∗ Peking University

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:27
26CCured in the Real World Jeremy Condit Matthew Harren Scott McPeak George C. Necula

CCured in the Real World Jeremy Condit Matthew Harren Scott McPeak George C. Necula

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2010-10-29 12:59:28
27Lecture 14 Introduction to Garbage Collection I  Why is Automatic GC Important and Hard?

Lecture 14 Introduction to Garbage Collection I Why is Automatic GC Important and Hard?

Add to Reading List

Source URL: dragonbook.stanford.edu

Language: English - Date: 2008-09-08 14:04:09
28ACSL: ANSI/ISO C Specification Language Version 1.9 ACSL: ANSI/ISO C Specification Language Version 1.9

ACSL: ANSI/ISO C Specification Language Version 1.9 ACSL: ANSI/ISO C Specification Language Version 1.9

Add to Reading List

Source URL: frama-c.com

Language: English - Date: 2015-03-17 11:33:40
29Lecture 14 Introduction to Garbage Collection I.  Memory Management II.  Why is Automatic GC Important and Hard? III.  Reference Counting IV.  Basic Trace-Based GC

Lecture 14 Introduction to Garbage Collection I.  Memory Management II.  Why is Automatic GC Important and Hard? III.  Reference Counting IV.  Basic Trace-Based GC

Add to Reading List

Source URL: suif.stanford.edu

Language: English - Date: 2012-01-08 01:59:37
30This version contains an evaluation that is slightly updated and corrected from the version appearing at ISCA[removed]iWatcher: Efficient Architectural Support for Software Debugging ∗ Pin Zhou, Feng Qin, Wei Liu, Yuany

This version contains an evaluation that is slightly updated and corrected from the version appearing at ISCA[removed]iWatcher: Efficient Architectural Support for Software Debugging ∗ Pin Zhou, Feng Qin, Wei Liu, Yuany

Add to Reading List

Source URL: iacoma.cs.uiuc.edu

Language: English - Date: 2004-07-19 14:19:05