Overflow

Results: 1424



#Item
311Monolithic kernels / Embedded operating systems / FreeBSD / NetBSD / Linux kernel / Buffer overflow / Berkeley Software Distribution / Kernel / Operating system / Computing / Software / System software

Binding the Daemon FreeBSD Kernel Stack and Heap Exploitation Patroklos (argp) Argyroudis

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:42:30
312Software bugs / Subroutines / Memory management / Call stack / Buffer overflow protection / Pointer / Stack buffer overflow / Stack / C dynamic memory allocation / Computing / Software engineering / Computer programming

Automated Security Debugging Using Program Structural Constraints∗ Chongkyung Kil∗, Emre Can Sezer∗, Peng Ning∗, and Xiaolan Zhang† Department of Computer Science∗ North Carolina State University {ckil, eseze

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:58
313Malware / Software bugs / Shellcode / Antivirus software / Buffer overflow / Computer virus / Code injection / Portable Executable / Hooking / Cyberwarfare / Computer security / Failure

WiShMaster Windows Shellcode Mastery BlackHat EuropeBenjamin CAILLAT

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:29
314Computer security / Stack buffer overflow / Buffer overflow / Shellcode / Address space layout randomization / Stack / Pointer / PaX / Heap overflow / Software bugs / Computing / Software quality

\x90\x90\x90\x90\x90\x90\x90\x90 Stack Smashing as of Today A State-of-the-Art Overview on Buffer Overflow Protections

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:29
315Heap overflow / VU / Vrije Universiteit

Argos Emulator Georgios Portokalidis Asia Slowinska Herbert Bos Vrije Universiteit Amsterdam

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-12-14 13:26:32
316C++ / Software bugs / Data types / Primitive types / Pointer / Dangling pointer / C / Virtual method table / Buffer overflow / Software engineering / Computing / Computer programming

DANGLING POINTER SMASHING THE POINTER FOR FUN AND PROFIT JONATHAN AFEK ADI SHARABANI A whitepaper from Watchfire

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
317Shellcode / Polymorphic code / Self-modifying code / MOV / Metasploit Project / Buffer overflow / Hacking: The Art of Exploitation Second Edition / Cyberwarfare / Computer security / Software

PDF Document

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-06-18 08:37:26
318Software engineering / Buffer overflow / Heap overflow / Stack buffer overflow / Memory corruption / Improper input validation / Stack / Software bugs / Software quality / Computing

Argos: The High-Interaction back-end Honeypot of NoAH

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2008-05-24 13:54:57
319Cyberwarfare / Security / Honeypot / Spamming / Buffer overflow / Stack buffer overflow / Heap overflow / Computer security / Client honeypot / Computer network security / Software bugs / Computing

SIXTH FRAMEWORK PROGRAMME Structuring the European Research Area Specific Programme RESEARCH INFRASTRUCTURES ACTION Contract No. RIDS

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-11-01 11:35:42
320Security / Software testing / Hacking / Vulnerability / CVSS / Security testing / Buffer overflow / Attack / Uncontrolled format string / Cyberwarfare / Computer security / Computer network security

Unforgivable Vulnerabilities Steve Christey The MITRE Corporation August 2, 2007

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
UPDATE