Heap overflow

Results: 84



#Item
61Software bugs / Pointer / C / Vulnerability / Heap overflow / Application security / OWASP / Computing / Software engineering / Computer programming

LeafSR_BlackHat_2014_Webcast

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:10
62Computer programming / Memory management / Concurrent computing / Buffer overflow protection / Heap overflow / C dynamic memory allocation / Buffer overflow / Address space layout randomization / C / Computing / Software engineering / Software bugs

HeapSentry: Kernel-assisted Protection against Heap Overflows Nick Nikiforakis, Frank Piessens, and Wouter Joosen iMinds-DistriNet, KU Leuven, 3001 Leuven, Belgium {firstname.lastname}@cs.kuleuven.be

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-04-22 08:41:11
63Computer programming / Buffer overflow protection / Stack buffer overflow / Buffer overflow / Heap overflow / Pointer / C dynamic memory allocation / Stack / Segmentation fault / Computing / Software engineering / Software bugs

ValueGuard: Protection of native applications against data-only buffer overflows Steven Van Acker, Nick Nikiforakis, Pieter Philippaerts, Yves Younan, and Frank Piessens IBBT-Distrinet Katholieke Universiteit Leuven

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-01-01 13:06:15
64Address space layout randomization / Buffer overflow / Software engineering / Heap overflow / Systems engineering / Software bugs / Computing / Sophos

Sophail: Applied attacks against Sophos Antivirus Tavis Ormandy [removed] Abstract By design, antivirus products introduce a vast attack surface to a hostile environment. The vendors of these products have a r

Add to Reading List

Source URL: lock.cmpxchg8b.com

Language: English - Date: 2013-06-24 02:07:40
65Memory management / Data Execution Prevention / Control flow / X86 architecture / NX bit / Buffer overflow / Address space layout randomization / Heap overflow / Stack buffer overflow / Computing / Software bugs / Computer errors

Bypassing Browser Memory Protections

Add to Reading List

Source URL: www.azimuthsecurity.com

Language: English - Date: 2010-04-10 04:10:26
66Software bugs / Shellcode / Buffer overflow / Computer file formats / Address space layout randomization / Dynamic-link library / Heap overflow / Stack / Metasploit Project / Computing / Computer security / Cyberwarfare

BYPASSING EMET 4.1 Jared DeMott Security Researcher [removed]

Add to Reading List

Source URL: bromiumlabs.files.wordpress.com

Language: English - Date: 2014-02-24 02:03:23
67Software bugs / Cross-platform software / Heap spraying / Shellcode / Buffer overflow / Address space layout randomization / NOP slide / JavaScript / Garbage collection / Computing / Cyberwarfare / Computer security

N OZZLE: A Defense Against Heap-spraying Code Injection Attacks Paruj Ratanaworabhan Cornell University Benjamin Livshits

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2009-06-08 14:53:11
68Software bugs / Memory management / Heap overflow / Buffer overflow / Heap spraying / C dynamic memory allocation / Address space layout randomization / Shellcode / Dynamic-link library / Computing / Software engineering / Computer programming

Pwn2Own 2010 Windows 7 Internet Explorer 8 exploit I decided to write a quick document about the techniques I used to exploit Internet Explorer 8 on windows 7 with ASLR and DEP enabled. The exploit consists of two parts.

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2010-12-28 00:16:40
69Software bugs / Memory management / Heap overflow / Buffer overflow / Heap spraying / C dynamic memory allocation / Address space layout randomization / Shellcode / Dynamic-link library / Computing / Software engineering / Computer programming

Pwn2Own 2010 Windows 7 Internet Explorer 8 exploit I decided to write a quick document about the techniques I used to exploit Internet Explorer 8 on windows 7 with ASLR and DEP enabled. The exploit consists of two parts.

Add to Reading List

Source URL: vreugdenhilresearch.nl

Language: English - Date: 2010-03-24 14:09:15
70Memory management / C Standard Library / Pointer / C programming language / C dynamic memory allocation / C / Sizeof / Buffer overflow / Heap overflow / Computing / Software engineering / Computer programming

Automated vulnerability analysis of zero sized heap allocations April 2010 Julien Vanegue ([removed]) Microsoft Security Engineering Center (MSEC)

Add to Reading List

Source URL: www.hackitoergosum.org

Language: English - Date: 2010-04-23 08:06:57
UPDATE