Memory corruption

Results: 51



#Item
21Software engineering / Buffer overflow / Heap overflow / Stack buffer overflow / Memory corruption / Improper input validation / Stack / Software bugs / Software quality / Computing

Argos: The High-Interaction back-end Honeypot of NoAH

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2008-05-24 13:54:57
22Backup / Data security / ASI Solutions / Data / Data loss / Hard disk drive / Computer hardware / Computing / Non-volatile memory

Data Loss Warning Form The following information applies to your business, You should be aware that some processes carried out during the repair of any computer device may result in the corruption, partial or total loss

Add to Reading List

Source URL: www.asi.com.au

Language: English - Date: 2013-10-01 01:08:59
23Software bugs / Computer errors / Memory management / Stack overflow / Stack / Call stack / ThreadX / Subroutine / C dynamic memory allocation / Computing / Software engineering / Computer programming

Helping you avoid stack overflow crashes! One of the toughest (and unfortunately common) problems in embedded systems is stack overflows and the collateral corruption that it can cause. As a result, we have spent consid

Add to Reading List

Source URL: rtos.com

Language: English - Date: 2010-11-12 18:36:33
24Computer programming / Pointer / Dangling pointer / Stack buffer overflow / Memory safety / Address space layout randomization / Buffer overflow / C / Memory corruption / Computing / Software engineering / Software bugs

SoK: Eternal War in Memory L´aszl´o Szekeres† , Mathias Payer‡ , Tao Wei∗‡ , Dawn Song‡ † Stony Brook University ‡ University of California, Berkeley ∗ Peking University

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:27
25Safari / WebKit / Google Chrome / IOS / Software / Web browsers / Pwn2Own

Attacking WebKit Applications by exploiting memory corruption bugs Liang Chen @KeenTeam @chenliang0817 About me

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2015-04-02 00:45:05
26Digital media / DIMM / Memory scrubbing / Dynamic random-access memory / RAM parity / Soft error / Data corruption / Error detection and correction / Error / Computer memory / Computer hardware / Computing

DRAM Errors in the Wild: A Large-Scale Field Study Bianca Schroeder Eduardo Pinheiro Wolf-Dietrich Weber

Add to Reading List

Source URL: static.googleusercontent.com

Language: English - Date: 2012-04-01 20:13:23
27Cyberwarfare / Buffer overflow / Stack buffer overflow / PaX / Memory safety / Return-to-libc attack / Address space layout randomization / Stack / Zero-day attack / Software bugs / Computer security / Computing

Chapter 1 Chapter 1 Introduction Even though memory corruption vulnerabilities are inherent to C, this language is

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2013-04-18 05:57:24
28Heap overflow / C dynamic memory allocation / Memory corruption / Heap / Software engineering / Computer programming / Heap spraying / Memory management / Computing / Software bugs

Attacking the Vista Heap Ben Hawkes v4 The Heap

Add to Reading List

Source URL: www.lateralsecurity.com

Language: English - Date: 2015-03-04 17:36:24
29Software bugs / Buffer overflow / Heap overflow / Address space layout randomization / Call stack / C dynamic memory allocation / Stack machine / Pointer / Memory corruption / Computing / Software engineering / Computer programming

Secure 64 SourceT OS Security Evaluation Report Matasano Security, LLC November 20, 2007

Add to Reading List

Source URL: www.secure64.com

Language: English - Date: 2009-10-09 13:10:06
30Software bugs / Data types / Primitive types / Assembly languages / Instruction set architectures / Buffer overflow / Pointer / Stack buffer overflow / X86 / Computing / Software engineering / Computer programming

Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis Mingwei Zhang1 , Aravind Prakash2 , Xiaolei Li1 , Zhenkai Liang1 , and Heng Yin2 1 School of Computing, National University

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2012-03-21 11:17:55
UPDATE