NX bit

Results: 20



#Item
11VIRUS BULLETIN www.virusbtn.com  EXPLOIT ANALYSIS ANI-HILATE THIS WEEK Peter Ferrie Symantec Security Response, USA

VIRUS BULLETIN www.virusbtn.com EXPLOIT ANALYSIS ANI-HILATE THIS WEEK Peter Ferrie Symantec Security Response, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 16:13:20
12Q: Exploit Hardening Made Easy  Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-12-17 15:18:11
13Buffer overflows on linux-x86-64 Hagen Fritsch <fritsch+stacksmashing@in.tum.de> Technische Universit¨at M¨unchen January 22nd, 2009

Buffer overflows on linux-x86-64 Hagen Fritsch Technische Universit¨at M¨unchen January 22nd, 2009

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
14Bypassing Browser Memory Protections

Bypassing Browser Memory Protections

Add to Reading List

Source URL: www.azimuthsecurity.com

Language: English - Date: 2010-04-10 04:10:26
152013 IEEE Symposium on Security and Privacy  Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

2013 IEEE Symposium on Security and Privacy Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2013-05-28 17:28:59
16

PDF Document

Add to Reading List

Source URL: force.vnsecurity.net

Language: English - Date: 2010-12-31 02:53:49
17

PDF Document

Add to Reading List

Source URL: force.vnsecurity.net

Language: English - Date: 2010-08-12 21:04:43
18Bypassing Browser Memory Protections Setting back browser security by 10 years Alexander Sotirov <alex@sotirov.net> Mark Dowd <markdowd@au1.ibm.com>  Introduction

Bypassing Browser Memory Protections Setting back browser security by 10 years Alexander Sotirov Mark Dowd Introduction

Add to Reading List

Source URL: www.phreedom.org

Language: English - Date: 2013-06-01 20:57:45
19Data Execution Prevention v1.2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Data Execution Prevention (DEP) . . . . . . . . . . .

Data Execution Prevention v1.2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Data Execution Prevention (DEP) . . . . . . . . . . .

Add to Reading List

Source URL: h10032.www1.hp.com

Language: English
20

PDF Document

Add to Reading List

Source URL: www.redhat.com

Language: English - Date: 2004-08-30 12:57:45