Heap overflow

Results: 84



#Item
41Software quality / Cyberwarfare / Vulnerability / Buffer overflow / Fuzz testing / Stack / Heap overflow / Exploit / Memory safety / Software bugs / Software testing / Computer security

Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications David Brumley, Pongsin Poosankam Dawn Song Jiang Zheng {dbrumley,ppoosank}@cs.cmu.edu

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2013-09-09 05:44:56
42Software quality / Software testing / Shellcode / Buffer overflow / Arbitrary code execution / Heap overflow / Address space layout randomization / Fuzz testing / Return-to-libc attack / Computer security / Cyberwarfare / Software bugs

doi:[removed][removed]The idea is to identify security-critical software bugs so they can be fixed first. By Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumle

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
43Software quality / Cyberwarfare / Vulnerability / Buffer overflow / Fuzz testing / Stack / Heap overflow / Exploit / Memory safety / Software bugs / Software testing / Computer security

Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications David Brumley, Pongsin Poosankam Dawn Song Jiang Zheng {dbrumley,ppoosank}@cs.cmu.edu [removed] [removed]

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
44Data segment / .bss / Memory address / C / Heap / Pointer / Heap overflow / Code segment / Computing / Memory management / Software engineering

Heap and BSS Overflow Ⅰ Arbro on[removed]removed[removed]

Add to Reading List

Source URL: www.chroot.org

Language: English - Date: 2005-02-18 11:00:11
45Cyberwarfare / Buffer overflow / Stack buffer overflow / Vulnerability / PaX / Application checkpointing / Heap overflow / Valgrind / C standard library / Computing / Software bugs / Computer security

Sweeper: A Lightweight End-to-End System for Defending Against Fast Worms James Newsome David Brumley Dawn Song

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
46Heap overflow / C dynamic memory allocation / Memory corruption / Heap / Software engineering / Computer programming / Heap spraying / Memory management / Computing / Software bugs

Attacking the Vista Heap Ben Hawkes v4 The Heap

Add to Reading List

Source URL: www.lateralsecurity.com

Language: English - Date: 2015-03-04 17:36:24
47Computing / Application security / Heap overflow / Qualys / Vulnerability / Metasploit Project / Shellcode / Exploit / Wireless security / Computer network security / Cyberwarfare / Computer security

HITBSECCONF2009 - DUBAI CONFERENCE KIT Event Overview Venue: Sheraton Dubai Creek

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:55:03
48Computing / Hacking / Software testing / Application security / Heap overflow / Malware / Network security / Vulnerability / White hat / Computer security / Cyberwarfare / Computer network security

HITBSecConf2010 OCTOBER 11TH - 14TH 2010 CROWNE PLAZA MUTIARA KUALA LUMPUR OCTOBER 4TH - 5TH

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:59:36
49Software bugs / Buffer overflow / Heap overflow / Address space layout randomization / Call stack / C dynamic memory allocation / Stack machine / Pointer / Memory corruption / Computing / Software engineering / Computer programming

Secure 64 SourceT OS Security Evaluation Report Matasano Security, LLC November 20, 2007

Add to Reading List

Source URL: www.secure64.com

Language: English - Date: 2009-10-09 13:10:06
UPDATE