<--- Back to Details
First PageDocument Content
Computer programming / Address space layout randomization / PaX / Buffer overflow / Position-independent code / Stack buffer overflow / Return-to-libc attack / Memory safety / C dynamic memory allocation / Computing / Software bugs / Software
Date: 2009-01-19 10:51:06
Computer programming
Address space layout randomization
PaX
Buffer overflow
Position-independent code
Stack buffer overflow
Return-to-libc attack
Memory safety
C dynamic memory allocation
Computing
Software bugs
Software

Add to Reading List

Source URL: seclab.cs.sunysb.edu

Download Document from Source Website

File Size: 234,15 KB

Share Document on Facebook

Similar Documents

Computing / Computer security / Software bugs / Address space layout randomization / Gadget / Buffer overflow / Return-to-libc attack / Shellcode / Instruction selection / Position-independent code / NOP / Return-oriented programming

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

DocID: 1rrtf - View Document

Programming language implementation / Compilers / Computer file formats / Dynamic linker / Dynamic loading / Data types / Library / Linker / Relocation / Portable Executable / Loader / Position-independent code

Cheating the ELF Subversive Dynamic Linking to Libraries the grugq Abstract: Development of feature rich Unix parasites has been severely limited by the inability to reliably access functions external to the host file. U

DocID: 1pleQ - View Document

Programming language implementation / Compilers / Compiler construction / Loader / Library / Static library / Linker / Position-independent code / Portable Executable / Dynamic linker / Relocation / Software

Safe Loading - A Foundation for Secure Execution of Untrusted Programs Mathias Payer ETH Zurich, Switzerland Tobias Hartmann ETH Zurich, Switzerland

DocID: 1nOwm - View Document

Computer memory / Address space layout randomization / Kernel same-page merging / Entropy / Data deduplication / Position-independent code / Paging / Return-oriented programming / Virtual machine / Relocation / Prelink / CPU cache

CAIN: Silently Breaking ASLR in the Cloud Antonio Barresi ETH Zurich Kaveh Razavi VU University Amsterdam

DocID: 1nIKm - View Document

Software / Computing / Computer architecture / Software bugs / PaX / X86 architecture / Address space layout randomization / Position-independent code / Exec Shield / Standard Performance Evaluation Corporation / Stack buffer overflow / X86-64

Too much PIE is bad for performance Mathias Department of Computer Science, ETH Zurich Abstract Compiling an application as a Position Independent Executable (PIE) enables Address Space L

DocID: 1n5Xl - View Document