Heap overflow

Results: 84



#Item
51Computer security / Buffer overflow / Stack buffer overflow / Vulnerability / Buffer overflow protection / Heap overflow / Software bugs / Software quality / Computing

= Very effective* = Effective* = Not effective N/A = not applicable *if well implemented Can Catch Buffer

Add to Reading List

Source URL: nsfsecurity.pr.erau.edu

Language: English - Date: 2002-07-06 21:19:53
52Microsoft PowerPoint[removed]Stonesoup Proposer's Day Brief final-with vendor list �rl

Microsoft PowerPoint[removed]Stonesoup Proposer's Day Brief final-with vendor list rl

Add to Reading List

Source URL: www.iarpa.gov

Language: English - Date: 2014-03-06 18:49:04
53Journal of Computer Security–1107 DOIJCSIOS Press 1083

Journal of Computer Security–1107 DOIJCSIOS Press 1083

Add to Reading List

Source URL: lenx.100871.net

Language: English - Date: 2012-05-09 22:37:04
54Ken	
  Johnson,	
  Ma,	
  Miller	
   Microso1	
  Security	
  Engineering	
  Center	
  (MSEC)	
   	
     Black	
  Hat	
  USA	
  2012	
   	
  

Ken  Johnson,  Ma,  Miller   Microso1  Security  Engineering  Center  (MSEC)       Black  Hat  USA  2012    

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-08-13 16:23:01
55Microsoft Internet Explorer Javaprxy.DLL COM Object Instantiation Heap Overflow Vulnerability 分類 再現性  Buffer Overflow/受動的攻撃

Microsoft Internet Explorer Javaprxy.DLL COM Object Instantiation Heap Overflow Vulnerability 分類 再現性 Buffer Overflow/受動的攻撃

Add to Reading List

Source URL: www.npa.go.jp

Language: Japanese
    56Int. J. Inf. Secur[removed]DOI[removed]s10207[removed]S P E C I A L I S S U E PA P E R  Stelios Sidiroglou · Angelos D. Keromytis

    Int. J. Inf. Secur[removed]DOI[removed]s10207[removed]S P E C I A L I S S U E PA P E R Stelios Sidiroglou · Angelos D. Keromytis

    Add to Reading List

    Source URL: www.cs.columbia.edu

    Language: English - Date: 2006-03-06 16:47:47
    57Using Execution Transactions To Recover From Buffer Overflow Attacks Stelios Sidiroglou Columbia University [removed]  Angelos D. Keromytis

    Using Execution Transactions To Recover From Buffer Overflow Attacks Stelios Sidiroglou Columbia University [removed] Angelos D. Keromytis

    Add to Reading List

    Source URL: www.cs.columbia.edu

    Language: English - Date: 2004-09-20 21:28:40
    58N OZZLE: A Defense Against Heap-spraying Code Injection Attacks Paruj Ratanaworabhan Cornell University  Benjamin Livshits

    N OZZLE: A Defense Against Heap-spraying Code Injection Attacks Paruj Ratanaworabhan Cornell University Benjamin Livshits

    Add to Reading List

    Source URL: research.microsoft.com

    Language: English - Date: 2009-06-05 22:26:35
    59\x90\x90\x90\x90\x90\x90\x90\x90  Stack Smashing as of Today A State-of-the-Art Overview on Buffer Overflow Protections

    \x90\x90\x90\x90\x90\x90\x90\x90 Stack Smashing as of Today A State-of-the-Art Overview on Buffer Overflow Protections

    Add to Reading List

    Source URL: blackhat.com

    Language: English - Date: 2014-12-16 19:06:29
    60Buffer overflows on linux-x86-64 Hagen Fritsch <fritsch+stacksmashing@in.tum.de> Technische Universit¨at M¨unchen January 22nd, 2009

    Buffer overflows on linux-x86-64 Hagen Fritsch Technische Universit¨at M¨unchen January 22nd, 2009

    Add to Reading List

    Source URL: blackhat.com

    Language: English - Date: 2014-12-16 19:06:29