Overflow

Results: 1424



#Item
231Computing / World Wide Web / Year of birth missing / Technology / New York University Stern School of Business / Information systems / Stack Overflow

The Hong Kong University of Science and Technology

Add to Reading List

Source URL: www.bm.ust.hk

Language: English - Date: 2015-02-05 12:14:35
232Cross-platform software / Splint / Lint / C / Buffer overflow / Pointer / Iterator / Computing / Software engineering / Computer programming

Splint Manual VersionJune 2003 Secure Programming Group University of Virginia

Add to Reading List

Source URL: lclint.cs.virginia.edu

Language: English - Date: 2003-06-05 12:00:50
233Systems engineering / Shellcode / Microsoft Gadgets / Stack buffer overflow / Buffer overflow / Gadget / Return-to-libc attack / Return-oriented programming / Heap spraying / Computing / Software bugs / Software quality

Size Does Matter/Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-09-10 08:46:40
234Data types / Computer arithmetic / C programming language / Primitive types / Procedural programming languages / Frama-C / Integer overflow / C / Undefined behavior / Computing / Software engineering / Computer programming

Annotation Generation Frama-C’s annotation generator plug-inCarbon version

Add to Reading List

Source URL: frama-c.com

Language: English - Date: 2013-09-24 04:53:50
235Heap spraying / Address space layout randomization / Vulnerability / Buffer overflow / Shellcode / Heap feng shui / Alexander Sotirov / Exploit / Computer security / Cyberwarfare / Failure

PDF Document

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-09-16 18:43:29
236Software bugs / Subroutines / Instruction set architectures / Calling convention / X86 architecture / X86 assembly language / Buffer overflow / Return-to-libc attack / X86 / Computing / Software engineering / Computer architecture

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:11
237Software bugs / Central processing unit / NX bit / Buffer overflow / NX technology / Data Execution Prevention / Operating system / Black Hat Briefings / Code injection / Computer security / Software / Computing

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
238Computing / Application security / Heap overflow / Qualys / Vulnerability / Metasploit Project / Shellcode / Exploit / Wireless security / Computer network security / Cyberwarfare / Computer security

PDF Document

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-10-26 12:55:03
239Malware / Shellcode / Software bugs / Polymorphic code / Buffer overflow / Arbitrary code execution / Self-modifying code / Metasploit Project / Forth / Cyberwarfare / Computer security / Computing

Network-Level Polymorphic Shellcode Detection Using Emulation Michalis Polychronakis1 , Kostas G. Anagnostakis2 , and Evangelos P. Markatos1 1 Institute of Computer Science, Foundation for Research & Technology – Hell

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-05-02 06:32:56
240Cyberwarfare / Software quality / Fuzz testing / Hacking / Vulnerability / Buffer overflow / Uncontrolled format string / Computer network security / Software testing / Computer security / Software bugs

Software Vulnerability • Refers to a weakness in a system allowing an attacker to violate the integrity, confidentiality, access control, availability, consistency or audit mechanism of the system or the data and appl

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
UPDATE