Heap overflow

Results: 84



#Item
41Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications David Brumley, Pongsin Poosankam Dawn Song Jiang Zheng {dbrumley,ppoosank}@cs.cmu.edu

Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications David Brumley, Pongsin Poosankam Dawn Song Jiang Zheng {dbrumley,ppoosank}@cs.cmu.edu

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2013-09-09 05:44:56
42doi:[removed][removed]The idea is to identify security-critical software bugs so they can be fixed first. By Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumle

doi:[removed][removed]The idea is to identify security-critical software bugs so they can be fixed first. By Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumle

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
43Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications David Brumley, Pongsin Poosankam Dawn Song Jiang Zheng {dbrumley,ppoosank}@cs.cmu.edu [removed] [removed]

Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications David Brumley, Pongsin Poosankam Dawn Song Jiang Zheng {dbrumley,ppoosank}@cs.cmu.edu [removed] [removed]

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
44Heap and BSS Overflow Ⅰ Arbro on[removed]removed[removed]

Heap and BSS Overflow Ⅰ Arbro on[removed]removed[removed]

Add to Reading List

Source URL: www.chroot.org

Language: English - Date: 2005-02-18 11:00:11
45Sweeper: A Lightweight End-to-End System for Defending Against Fast Worms James Newsome David Brumley Dawn Song

Sweeper: A Lightweight End-to-End System for Defending Against Fast Worms James Newsome David Brumley Dawn Song

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
46Attacking the Vista Heap Ben Hawkes v4  The Heap

Attacking the Vista Heap Ben Hawkes v4 The Heap

Add to Reading List

Source URL: www.lateralsecurity.com

Language: English - Date: 2015-03-04 17:36:24
47HITBSECCONF2009 - DUBAI CONFERENCE KIT Event Overview Venue: Sheraton Dubai Creek

HITBSECCONF2009 - DUBAI CONFERENCE KIT Event Overview Venue: Sheraton Dubai Creek

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:55:03
48HITBSecConf2010 OCTOBER 11TH - 14TH 2010 CROWNE PLAZA MUTIARA KUALA LUMPUR  OCTOBER 4TH - 5TH

HITBSecConf2010 OCTOBER 11TH - 14TH 2010 CROWNE PLAZA MUTIARA KUALA LUMPUR OCTOBER 4TH - 5TH

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:59:36
49Secure 64 SourceT OS Security Evaluation Report Matasano Security, LLC November 20, 2007

Secure 64 SourceT OS Security Evaluation Report Matasano Security, LLC November 20, 2007

Add to Reading List

Source URL: www.secure64.com

Language: English - Date: 2009-10-09 13:10:06