Heap overflow

Results: 84



#Item
31Symbolic Heap Abstraction with DemandDriven Axiomatization of Memory Invariants ∗ Isil Dillig Thomas Dillig  Alex Aiken

Symbolic Heap Abstraction with DemandDriven Axiomatization of Memory Invariants ∗ Isil Dillig Thomas Dillig Alex Aiken

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-08-09 15:18:34
32Binding the Daemon FreeBSD Kernel Stack and Heap Exploitation Patroklos (argp) Argyroudis

Binding the Daemon FreeBSD Kernel Stack and Heap Exploitation Patroklos (argp) Argyroudis

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:42:30
33\x90\x90\x90\x90\x90\x90\x90\x90  Stack Smashing as of Today A State-of-the-Art Overview on Buffer Overflow Protections

\x90\x90\x90\x90\x90\x90\x90\x90 Stack Smashing as of Today A State-of-the-Art Overview on Buffer Overflow Protections

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:29
34Argos Emulator Georgios Portokalidis Asia Slowinska Herbert Bos Vrije Universiteit Amsterdam

Argos Emulator Georgios Portokalidis Asia Slowinska Herbert Bos Vrije Universiteit Amsterdam

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-12-14 13:26:32
35Argos:  The High-Interaction back-end Honeypot of NoAH

Argos: The High-Interaction back-end Honeypot of NoAH

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2008-05-24 13:54:57
36SIXTH FRAMEWORK PROGRAMME Structuring the European Research Area Specific Programme RESEARCH INFRASTRUCTURES ACTION Contract No. RIDS

SIXTH FRAMEWORK PROGRAMME Structuring the European Research Area Specific Programme RESEARCH INFRASTRUCTURES ACTION Contract No. RIDS

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-11-01 11:35:42
37Heap Taichi: Exploiting Memory Allocation Granularity in Heap-Spraying Attacks Yu Ding1,2 , Tao Wei1,2∗, TieLei Wang1,2 , Zhenkai Liang3 , Wei Zou1,2 , Institute of Computer Science and Technology, Peking University Ke

Heap Taichi: Exploiting Memory Allocation Granularity in Heap-Spraying Attacks Yu Ding1,2 , Tao Wei1,2∗, TieLei Wang1,2 , Zhenkai Liang3 , Wei Zou1,2 , Institute of Computer Science and Technology, Peking University Ke

Add to Reading List

Source URL: lenx.100871.net

Language: English - Date: 2012-05-09 22:08:36
38Guidance notes on completing job application forms Fingal Volunteer Centre’s mission is to to help individuals find meaningful opportunities to volunteer and to build the capacity of not-for-profit organisations to inv

Guidance notes on completing job application forms Fingal Volunteer Centre’s mission is to to help individuals find meaningful opportunities to volunteer and to build the capacity of not-for-profit organisations to inv

Add to Reading List

Source URL: www.volunteerfingal.ie

Language: English - Date: 2014-07-04 04:52:43
39Secure Programming with GCC and GLibc Marcel Holtmann CanSecWest 2008, Vancouver  Introduction

Secure Programming with GCC and GLibc Marcel Holtmann CanSecWest 2008, Vancouver Introduction

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2008-06-12 15:35:33
40Sweeper: A Lightweight End-to-End System for Defending Against Fast Worms Joseph Tucek Shan Lu, Chengdu Huang, Spiros Xanthos Yuanyuan Zhou

Sweeper: A Lightweight End-to-End System for Defending Against Fast Worms Joseph Tucek Shan Lu, Chengdu Huang, Spiros Xanthos Yuanyuan Zhou

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:29