Heap overflow

Results: 84



#Item
51Computer security / Buffer overflow / Stack buffer overflow / Vulnerability / Buffer overflow protection / Heap overflow / Software bugs / Software quality / Computing

= Very effective* = Effective* = Not effective N/A = not applicable *if well implemented Can Catch Buffer

Add to Reading List

Source URL: nsfsecurity.pr.erau.edu

Language: English - Date: 2002-07-06 21:19:53
52Buffer overflow / Information security / Intelligence Advanced Research Projects Activity / Cyberwarfare / Public safety / Security / Computer security / Heap overflow

Microsoft PowerPoint[removed]Stonesoup Proposer's Day Brief final-with vendor list rl

Add to Reading List

Source URL: www.iarpa.gov

Language: English - Date: 2014-03-06 18:49:04
53Computer programming / Integer overflow / Buffer overflow / Heap overflow / Vulnerability / Fixed-point arithmetic / C / Type system / Infinite loop / Software bugs / Computing / Software engineering

Journal of Computer Security–1107 DOIJCSIOS Press 1083

Add to Reading List

Source URL: lenx.100871.net

Language: English - Date: 2012-05-09 22:37:04
54Software bugs / Address space layout randomization / Malware / Pointer / Vulnerability / Duqu / Pwn2Own / Heap overflow / Stack buffer overflow / Computer security / Computing / Cyberwarfare

Ken  Johnson,  Ma,  Miller   Microso1  Security  Engineering  Center  (MSEC)       Black  Hat  USA  2012    

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-08-13 16:23:01
55

Microsoft Internet Explorer Javaprxy.DLL COM Object Instantiation Heap Overflow Vulnerability 分類 再現性 Buffer Overflow/受動的攻撃

Add to Reading List

Source URL: www.npa.go.jp

Language: Japanese
    56Software quality / Buffer overflow protection / Buffer overflow / Heap overflow / C dynamic memory allocation / Setjmp.h / Memory leak / SQL Slammer / Blaster / Computing / Software bugs / Software engineering

    Int. J. Inf. Secur[removed]DOI[removed]s10207[removed]S P E C I A L I S S U E PA P E R Stelios Sidiroglou · Angelos D. Keromytis

    Add to Reading List

    Source URL: www.cs.columbia.edu

    Language: English - Date: 2006-03-06 16:47:47
    57Software engineering / Buffer overflow / Setjmp.h / Heap overflow / C dynamic memory allocation / Stack / Stack buffer overflow / Software bugs / Computing / Software quality

    Using Execution Transactions To Recover From Buffer Overflow Attacks Stelios Sidiroglou Columbia University [removed] Angelos D. Keromytis

    Add to Reading List

    Source URL: www.cs.columbia.edu

    Language: English - Date: 2004-09-20 21:28:40
    58Software bugs / Cross-platform software / Heap spraying / Shellcode / Buffer overflow / Address space layout randomization / NOP slide / JavaScript / Garbage collection / Computing / Cyberwarfare / Computer security

    N OZZLE: A Defense Against Heap-spraying Code Injection Attacks Paruj Ratanaworabhan Cornell University Benjamin Livshits

    Add to Reading List

    Source URL: research.microsoft.com

    Language: English - Date: 2009-06-05 22:26:35
    59Computer security / Stack buffer overflow / Buffer overflow / Shellcode / Address space layout randomization / Stack / Pointer / PaX / Heap overflow / Software bugs / Computing / Software quality

    \x90\x90\x90\x90\x90\x90\x90\x90 Stack Smashing as of Today A State-of-the-Art Overview on Buffer Overflow Protections

    Add to Reading List

    Source URL: blackhat.com

    Language: English - Date: 2014-12-16 19:06:29
    60Software engineering / Stack buffer overflow / Buffer overflow / Address space layout randomization / PaX / Heap overflow / NX bit / Uncontrolled format string / Stack / Computing / Software bugs / Software quality

    Buffer overflows on linux-x86-64 Hagen Fritsch Technische Universit¨at M¨unchen January 22nd, 2009

    Add to Reading List

    Source URL: blackhat.com

    Language: English - Date: 2014-12-16 19:06:29
    UPDATE