Heap spraying

Results: 24



#Item
1$hell on Earth: From Browser to System Compromise Matt Molinyawe, Abdul-Aziz Hariri, and Jasiel Spelman A Zero Day Initiative Research Paper

$hell on Earth: From Browser to System Compromise Matt Molinyawe, Abdul-Aziz Hariri, and Jasiel Spelman A Zero Day Initiative Research Paper

Add to Reading List

Source URL: documents.trendmicro.com

Language: English - Date: 2016-08-03 12:08:47
2風水 Heap Feng Shui in JavaScript Alexander Sotirov   Introduction

風水 Heap Feng Shui in JavaScript Alexander Sotirov Introduction

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:17
3風水 Heap Feng Shui in JavaScript Alexander Sotirov   Introduction

風水 Heap Feng Shui in JavaScript Alexander Sotirov Introduction

Add to Reading List

Source URL: www.phreedom.org

Language: English - Date: 2013-06-01 20:57:17
4Advanced Heap Manipulation in Windows 8 Zhenhua(Eric) Liu  VERSION 1.2 Contents

Advanced Heap Manipulation in Windows 8 Zhenhua(Eric) Liu VERSION 1.2 Contents

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-04-01 08:11:01
5Size Does Matter/Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard

Size Does Matter/Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-09-10 08:46:40
6L OBOTOMY An Architecture for JIT Spraying Mitigation Martin Jauernig Matthias Neugschwandtner

L OBOTOMY An Architecture for JIT Spraying Mitigation Martin Jauernig Matthias Neugschwandtner

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-11-07 13:39:36
7

PDF Document

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-09-16 18:43:29
8Detecting Web Browser Heap Corruption Attacks Stephan Chenette Moti Joseph

Detecting Web Browser Heap Corruption Attacks Stephan Chenette Moti Joseph

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
9Heap Taichi: Exploiting Memory Allocation Granularity in Heap-Spraying Attacks Yu Ding1,2 , Tao Wei1,2∗, TieLei Wang1,2 , Zhenkai Liang3 , Wei Zou1,2 , Institute of Computer Science and Technology, Peking University Ke

Heap Taichi: Exploiting Memory Allocation Granularity in Heap-Spraying Attacks Yu Ding1,2 , Tao Wei1,2∗, TieLei Wang1,2 , Zhenkai Liang3 , Wei Zou1,2 , Institute of Computer Science and Technology, Peking University Ke

Add to Reading List

Source URL: lenx.100871.net

Language: English - Date: 2012-05-09 22:08:36
10Heap Taichi: Exploiting Memory Allocation Granularity in Heap-Spraying Attacks Yu Ding1, Tao Wei1, Tielei Wang1, Zhenkai Liang2, Wei Zou1 1Peking University, 2National University of Singapore

Heap Taichi: Exploiting Memory Allocation Granularity in Heap-Spraying Attacks Yu Ding1, Tao Wei1, Tielei Wang1, Zhenkai Liang2, Wei Zou1 1Peking University, 2National University of Singapore

Add to Reading List

Source URL: powerofcommunity.net

Language: English - Date: 2010-12-05 20:13:17