Back to Results
First PageMeta Content
Software bugs / C Standard Library / Stack buffer overflow / Buffer overflow / Subroutines / Address space layout randomization / Return-to-libc attack / NX bit / Pointer / Computing / Software engineering / Computer programming


2013 IEEE Symposium on Security and Privacy Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science
Add to Reading List

Document Date: 2014-09-05 15:38:44


Open Document

File Size: 721,53 KB

Share Result on Facebook

City

Darmstadt / /

Company

Atmel / Adobe / Intel / Microsoft / /

Currency

USD / /

/

Facility

Computer Science University of North Carolina / STORE Gadget / /

IndustryTerm

compiler infrastructure / compromised end-user systems / software vendors / lazy search / code page harvesting algorithm / call site / recursive search / Internet Explorer process / Internet Explorer / antivirus products / offline gadget tools / /

OperatingSystem

Windows 7 / Linux / Android / Microsoft Windows / /

Organization

University of North Carolina / Fabian Monrose Department / /

Person

Lucas Davi / Alexandra Dmitrienko / Ahmad-Reza Sadeghi / Jean-Baptiste Alphonse Karr / Christopher Liebchen / Fabian Monrose / Kevin Z. Snow / /

Position

exploit writer / Scripting Facility Define Target Program Exploit Writer / straight-forward / novelist / /

Product

JavaScript / Metasploit’s code injection / /

ProgrammingLanguage

L / ActionScript / C / ML / JavaScript / HTML / C++ / /

Technology

ActionScript / Galileo algorithm / Linux / API / code page harvesting algorithm / paging / Android / operating system / HTML / operating systems / Acrobat / PDF / /

URL

http /

SocialTag