Memory protection

Results: 165



#Item
141International Republican Institute / John McCain / Republican National Convention / Defense Prisoner of War/Missing Personnel Office / Freedom of information legislation / National Information Infrastructure Protection Act / Political positions of John McCain / Military personnel / United States / Military

PDF Document

Add to Reading List

Source URL: memory.loc.gov

Language: English - Date: 2004-08-06 08:23:05
142Computer programming / Buffer overflow protection / Stack buffer overflow / Buffer overflow / Heap overflow / Pointer / C dynamic memory allocation / Stack / Segmentation fault / Computing / Software engineering / Software bugs

ValueGuard: Protection of native applications against data-only buffer overflows Steven Van Acker, Nick Nikiforakis, Pieter Philippaerts, Yves Younan, and Frank Piessens IBBT-Distrinet Katholieke Universiteit Leuven

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2011-05-26 17:50:53
143Cyberwarfare / Buffer overflow protection / Stack buffer overflow / Buffer overflow / PaX / Address space layout randomization / Circular buffer / Pointer / Uncontrolled format string / Computing / Software bugs / Computer security

Breaking the memory secrecy assumption Raoul Strackx Yves Younan Pieter Philippaerts

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-03-01 01:14:43
144Software bugs / Buffer overflow protection / Stack buffer overflow / Buffer overflow / Xen / QEMU / Memory safety / X86 / Virtual machine / System software / Software / Computing

Instruction-level countermeasures against stack-based buffer overflow attacks Francesco Gadaleta Yves Younan

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-03-01 01:19:38
145Software bugs / C Standard Library / System call / Buffer overflow protection / C dynamic memory allocation / Stack buffer overflow / Address space layout randomization / Return-to-libc attack / Pointer / Computing / Software engineering / Computer programming

JITSec: Just-in-time Security for Code Injection Attacks Willem De Groef, Nick Nikiforakis, Yves Younan, and Frank Piessens IBBT-DistriNet Katholieke Universiteit Leuven Celestijnenlaan 200A B3001

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-03-01 01:12:51
146Software bugs / Buffer overflow protection / Buffer overflow / Stack / Pointer / Processor register / C dynamic memory allocation / X86 / Subroutine / Computing / Software engineering / Computer programming

Efficient and Effective Buffer Overflow Protection on ARM Processors Raoul Strackx, Yves Younan, Pieter Philippaerts, and Frank Piessens Katholieke Universiteit Leuven, Celestijnenlaan 200A, B-3001 Heverlee, Belgium raou

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-03-01 01:13:36
147Computer programming / Stack buffer overflow / Buffer overflow protection / Buffer overflow / Stack / Memory safety / Call stack / Pointer / C / Computing / Software engineering / Software bugs

Extended protection against stack smashing attacks without performance loss1 Yves Younana Davide Pozzab Frank Piessensa

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-02-25 04:08:30
148Software bugs / Memory management / Computer errors / Buffer overflow protection / Stack buffer overflow / Buffer overflow / C Standard Library / Address space layout randomization / PaX / Computing / Software engineering / Computer programming

               

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-03-01 01:23:17
149Computer security / Memory management / Buffer overflow protection / Buffer overflow / Memory safety / Stack buffer overflow / PaX / Uncontrolled format string / C dynamic memory allocation / Computing / Software bugs / Software engineering

Protecting global and static variables from buffer overflow attacks Yves Younan Frank Piessens Wouter Joosen

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-03-01 01:16:09
150Cyberwarfare / Buffer overflow protection / Buffer overflow / Vulnerability / PaX / Uncontrolled format string / Stack / C dynamic memory allocation / Shellcode / Software bugs / Computer security / Computing

PDF Document

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-02-25 04:08:30
UPDATE