<--- Back to Details
First PageDocument Content
Software testing / Address space layout randomization / Computer network security / Binary hardening / Code injection / SQL injection / Heap / Vulnerability / GrammaTech / Computer security
Date: 2015-10-27 14:35:32
Software testing
Address space layout randomization
Computer network security
Binary hardening
Code injection
SQL injection
Heap
Vulnerability
GrammaTech
Computer security

REPORT DOCUMENTATION PAGE

Add to Reading List

Source URL: samate.nist.gov

Download Document from Source Website

File Size: 3,66 MB

Share Document on Facebook

Similar Documents

Fine-Grained Control-Flow Integrity through Binary Hardening Mathias Payer1 , Antonio Barresi2 , and Thomas R. Gross2 1 Purdue University

DocID: 1u46n - View Document

Linux Binary Hardening with Glibc Hyeonho Seo About Me ●

DocID: 1sGl1 - View Document

Software testing / Address space layout randomization / Computer network security / Binary hardening / Code injection / SQL injection / Heap / Vulnerability / GrammaTech / Computer security

REPORT DOCUMENTATION PAGE

DocID: 1pe8m - View Document

Software engineering / Computer programming / Computing / Edsger W. Dijkstra / Computer security / Control-flow integrity / Subroutines / Control flow / Pointer / DynamoRIO / Goto / Stack

Fine-Grained Control-Flow Integrity through Binary Hardening Mathias Payer1 , Antonio Barresi2 , and Thomas R. Gross2 1 Purdue University

DocID: 1noTk - View Document

Computer programming / Software engineering / Computing / Computer security / Control-flow integrity / Code reuse / Return-oriented programming / Subroutine / Control flow / Flow graph / Pointer

Fine-Grained Control-Flow Integrity through Binary Hardening Mathias Payer, Antonio Barresi, Thomas R. Gross ETH Zürich

DocID: 1mIxC - View Document