Back to Results
First PageMeta Content
C Standard Library / Return-to-libc attack / Address space layout randomization / Buffer overflow / GADGET / MOV / Shellcode / NX bit / Instruction selection / Computer architecture / Computing / Software bugs


Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu
Add to Reading List

Document Date: 2014-05-29 15:38:01


Open Document

File Size: 685,72 KB

Share Result on Facebook

Company

Adobe / AT&T / Oracle / /

Currency

USD / /

/

Facility

David Brumley Carnegie Mellon University / /

IndustryTerm

naive search / software programs / virtual hardware / software defense / gadget arrangement algorithm / assignment algorithms / /

OperatingSystem

Windows Vista / Mac OS X / Windows 7 / Linux / Ubuntu / Microsoft Windows / /

Organization

Carnegie Mellon University / Pittsburgh / /

Person

Edward J. Schwartz / David Brumley Carnegie / /

Product

Mozilla Firefox / Adobe Reader / Java JRE / Binary Analysis Platform / /

ProgrammingLanguage

Java / /

ProvinceOrState

Georgia / /

Technology

gadget arrangement algorithm / cellular telephone / assignment algorithms / Apple Quicktime / Java / Linux / 8 Algorithm / caching / 2.2 Semantic Analysis Gadget Discovery Algorithm / second algorithm / Operating System / operating systems / two algorithms / /

SocialTag