Memory corruption

Results: 51



#Item
1S AFE D ISPATCH: Securing C++ Virtual Calls from Memory Corruption Attacks Dongseok Jang Zachary Tatlock

S AFE D ISPATCH: Securing C++ Virtual Calls from Memory Corruption Attacks Dongseok Jang Zachary Tatlock

Add to Reading List

Source URL: homes.cs.washington.edu

Language: English - Date: 2018-10-18 11:22:47
2Service BulletinStacker - Quipp 40X and 50X Series  No Boot Up Device - Message PROBLEM: No boot up device message. 500 Series Stacker On a 500 series stacker this message typically occurs because of corruption in

Service BulletinStacker - Quipp 40X and 50X Series No Boot Up Device - Message PROBLEM: No boot up device message. 500 Series Stacker On a 500 series stacker this message typically occurs because of corruption in

Add to Reading List

Source URL: www.quipp.com

Language: English - Date: 2016-01-11 15:34:31
3S AFE D ISPATCH: Securing C++ Virtual Calls from Memory Corruption Attacks Dongseok Jang Zachary Tatlock

S AFE D ISPATCH: Securing C++ Virtual Calls from Memory Corruption Attacks Dongseok Jang Zachary Tatlock

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2013-12-28 00:32:24
4Code-Pointer Integrity Volodmyr Kuzentsov, László Szekeres, Mathias Payer, George Candea, R. Sekar, and Dawn Song  (c) TriStar Pictures, Inc. & Touchstone Pictures, 1997

Code-Pointer Integrity Volodmyr Kuzentsov, László Szekeres, Mathias Payer, George Candea, R. Sekar, and Dawn Song (c) TriStar Pictures, Inc. & Touchstone Pictures, 1997

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
5An Analysis of Latent Sector Errors in Disk Drives Lakshmi N. Bairavasundaram† , Garth R. Goodson, Shankar Pasupathy, Jiri Schindler † †  University of Wisconsin-Madison, Network Appliance, Inc.

An Analysis of Latent Sector Errors in Disk Drives Lakshmi N. Bairavasundaram† , Garth R. Goodson, Shankar Pasupathy, Jiri Schindler † † University of Wisconsin-Madison, Network Appliance, Inc.

Add to Reading List

Source URL: research.cs.wisc.edu

Language: English - Date: 2007-07-11 01:51:56
6… in memory: an evolution of attacks  Mathias Payer <> UC Berkeley Images (c) MGM, WarGames, 1983

… in memory: an evolution of attacks Mathias Payer <> UC Berkeley Images (c) MGM, WarGames, 1983

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
7Memory Corruption Attacks The (almost) Complete History thinkst applied research haroon meer

Memory Corruption Attacks The (almost) Complete History thinkst applied research haroon meer

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:53:12
8Dependability Analysis of Virtual Memory Systems Lakshmi N. Bairavasundaram Andrea C. Arpaci-Dusseau Remzi H. Arpaci-Dusseau Computer Sciences Department University of Wisconsin, Madison

Dependability Analysis of Virtual Memory Systems Lakshmi N. Bairavasundaram Andrea C. Arpaci-Dusseau Remzi H. Arpaci-Dusseau Computer Sciences Department University of Wisconsin, Madison

Add to Reading List

Source URL: research.cs.wisc.edu

Language: English - Date: 2006-05-26 20:19:40
9Attacker “Math” 101 Professor Dai Zovi Institute for the Advancement of Memory Corruption  What is this all

Attacker “Math” 101 Professor Dai Zovi Institute for the Advancement of Memory Corruption What is this all

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:17
10Exploitation of Via Memory corruption Private & Confidential Property of COSEINC

Exploitation of Via Memory corruption Private & Confidential Property of COSEINC

Add to Reading List

Source URL: archive.hack.lu

Language: English - Date: 2012-10-23 09:27:27