Exec Shield

Results: 9



#Item
1Software / Computing / Computer architecture / Software bugs / PaX / X86 architecture / Address space layout randomization / Position-independent code / Exec Shield / Standard Performance Evaluation Corporation / Stack buffer overflow / X86-64

Too much PIE is bad for performance Mathias Department of Computer Science, ETH Zurich Abstract Compiling an application as a Position Independent Executable (PIE) enables Address Space L

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
2Software quality / Stack buffer overflow / Buffer overflow protection / Buffer overflow / Address space layout randomization / PaX / Heap overflow / Return-to-libc attack / Exec Shield / Software bugs / Computing / Computer security

(un) Smashing the Stack: 66ee66dd66bb 33aa6e

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:26
3Software bugs / C Standard Library / Memory management / Address space layout randomization / PaX / C dynamic memory allocation / Exec Shield / Return-to-libc attack / Relocation / Computing / Computer programming / Software

Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software Chongkyung Kil∗, Jinsuk Jun∗, Christopher Bookholt∗, Jun Xu†, Peng Ning∗ Department of Computer Science∗ North

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:57
4Exec Shield / GNU Compiler Collection / Address space layout randomization / C dynamic memory allocation / GNU C Library / Buffer overflow / Heap overflow / Printf format string / Software / Computing / C Standard Library

Guidance notes on completing job application forms Fingal Volunteer Centre’s mission is to to help individuals find meaningful opportunities to volunteer and to build the capacity of not-for-profit organisations to inv

Add to Reading List

Source URL: www.volunteerfingal.ie

Language: English - Date: 2014-07-04 04:52:43
5Exec Shield / GNU Compiler Collection / Address space layout randomization / C dynamic memory allocation / GNU C Library / Buffer overflow / Heap overflow / Printf format string / Software / Computing / C Standard Library

Secure Programming with GCC and GLibc Marcel Holtmann CanSecWest 2008, Vancouver Introduction

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2008-06-12 15:35:33
6Exec Shield / Linux / NX bit / Process / Address space layout randomization / PaX / Exec / X86 / Pointer / Computing / Computer architecture / System software

Exec-shield 환경 내의 exploit 작성 방법

Add to Reading List

Source URL: powerofcommunity.net

Language: English - Date: 2008-11-04 08:59:42
7Software engineering / Return-to-libc attack / Address space layout randomization / PaX / Buffer overflow / NX bit / Exec Shield / Stack overflow / Stack / Software bugs / Computing / Software quality

PDF Document

Add to Reading List

Source URL: force.vnsecurity.net

Language: English - Date: 2010-12-31 02:53:49
8System software / Return-to-libc attack / PaX / Address space layout randomization / NX bit / Buffer overflow / Exec Shield / Stack / ASCII / Software bugs / Computing / Software

PDF Document

Add to Reading List

Source URL: force.vnsecurity.net

Language: English - Date: 2010-08-12 21:04:43
9Software bugs / Linux / Exec Shield / PaX / Buffer overflow / NX bit / Stack buffer overflow / Grsecurity / Data Execution Prevention / Computer security / Computing / Software

PDF Document

Add to Reading List

Source URL: www.redhat.com

Language: English - Date: 2004-08-30 12:57:45
UPDATE