Heap overflow

Results: 84



#Item
71Software bugs / Address space layout randomization / PaX / Buffer overflow / Stack buffer overflow / Heap overflow / JIT spraying / Uncontrolled format string / Heap spraying / Computer security / Computing / Cyberwarfare

PDF Document

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2012-07-17 11:27:12
72Computer security / Buffer overflow / Heap overflow / Circular buffer / Integer overflow / Vulnerability / Code injection / Pointer / Stack overflow / Computing / Software bugs / Cyberwarfare

Microsoft Word - CWEs_as_vuln_theory.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-07-18 14:25:17
73Computer programming / Buffer overflow protection / Stack buffer overflow / Buffer overflow / Heap overflow / Pointer / C dynamic memory allocation / Stack / Segmentation fault / Computing / Software engineering / Software bugs

ValueGuard: Protection of native applications against data-only buffer overflows Steven Van Acker, Nick Nikiforakis, Pieter Philippaerts, Yves Younan, and Frank Piessens IBBT-Distrinet Katholieke Universiteit Leuven

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2011-05-26 17:50:53
74Software bugs / Buffer overflow / Memory safety / Heap overflow / Vulnerability / Uncontrolled format string / Pointer / Return-to-libc attack / Dangling pointer / Computing / Cyberwarfare / Computer security

Runtime countermeasures for code injection attacks against C and C++ programs YVES YOUNAN, WOUTER JOOSEN and FRANK PIESSENS Katholieke Universiteit Leuven The lack of memory-safety in C/C++ often leads to vulnerabilitie

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-02-27 15:05:36
75Computer programming / Memory management / Computer memory / Buffer overflow / C++ / Pointer / Dangling pointer / C dynamic memory allocation / Heap overflow / Computing / Software bugs / Software engineering

A Methodology for Designing Countermeasures Against Current and Future Code Injection Attacks Yves Younan, Wouter Joosen, Frank Piessens DistriNet, Department of Computer Science Katholieke Universiteit Leuven Celestijne

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-02-25 04:08:30
76Software bugs / Heap spraying / Buffer overflow / Shellcode / Address space layout randomization / NOP slide / Cross-site request forgery / NOP / JavaScript / Cyberwarfare / Computing / Computer security

BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks Francesco Gadaleta, Yves Younan, and Wouter Joosen IBBT-Distrinet, Katholieke Universiteit Leuven, 3001, Leuven Belgium Abstract. Web brows

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-02-27 15:06:55
77Computer security / Embedded operating systems / Heap overflow / Buffer overflow / Computer network security / Cisco IOS / Router / Shellcode / Cisco Systems / Computing / Cyberwarfare / Software bugs

The Holy Grail: Cisco IOS Shellcode And Exploitation Techniques Michael Lynn Internet Security Systems

Add to Reading List

Source URL: bernd-paysan.de

Language: English - Date: 2005-07-30 09:17:01
78Memory management / Data Execution Prevention / Control flow / X86 architecture / NX bit / Buffer overflow / Address space layout randomization / Heap overflow / Stack buffer overflow / Computing / Software bugs / Computer errors

Bypassing Browser Memory Protections Setting back browser security by 10 years Alexander Sotirov Mark Dowd Introduction

Add to Reading List

Source URL: www.phreedom.org

Language: English - Date: 2013-06-01 20:57:45
79Software bugs / Memory management / Memory safety / C dynamic memory allocation / Heap overflow / New / Valgrind / Memory corruption / Allocator / Computing / Software engineering / Computer programming

DieHard: Probabilistic Memory Safety for Unsafe Languages Emery D. Berger

Add to Reading List

Source URL: people.cs.umass.edu

Language: English - Date: 2006-04-04 08:43:47
80Software quality / Stack buffer overflow / Buffer overflow / Heap overflow / Pointer / Shellcode / Stack / Circular buffer / C dynamic memory allocation / Computing / Software bugs / Software engineering

Attacking Systems Beyond Stack Smashing:

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2013-04-08 13:37:56
UPDATE