First Page | Document Content | |
---|---|---|
![]() Date: 2012-04-07 14:20:11Software bugs Subroutines Instruction set architectures Calling convention X86 architecture X86 assembly language Buffer overflow Return-to-libc attack X86 Computing Software engineering Computer architecture | Source URL: media.blackhat.comDownload Document from Source WebsiteFile Size: 345,80 KBShare Document on Facebook |
![]() | Alias Analysis for Assembly David Brumley and James Newsome December 15, 2006 CMU-CS-06-180RDocID: 1rinQ - View Document |
![]() | ¨ BOCHUM RUHR-UNIVERSITAT Horst G¨ortz Institute for IT Security Technical Report TR-HGIDocID: 1rePV - View Document |
![]() | The Semantics of x86-CC Multiprocessor Machine Code Susmit Sarkar1 Scott Owens1 Tom Ridge1DocID: 1r4yz - View Document |
![]() | SACK: a Semantic Automated Compiler Kit Colby T. Skeggs Applications o Rapid architecture testing o Automatically-generated architectures: o For securityDocID: 1qjbC - View Document |
![]() | wgc2_OA_title.fm Page i Thursday, April 20, :25 PM fro m WRITE GREAT CODE V ol um e 2 : T hi nk in g Low -Lev el , W r i t in g Hi gh -Lev elDocID: 1qcYF - View Document |