Overflow

Results: 1424



#Item
331Cyberwarfare / Stack buffer overflow / Buffer overflow / Uncontrolled format string / Vulnerability / Valgrind / C / Malware / Pointer / Computing / Software bugs / Software engineering

Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software James Newsome Carnegie Mellon University Abstract

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:29
332Computer programming / Buffer overflow / Stack buffer overflow / Vulnerability / PaX / Application checkpointing / Heap overflow / Valgrind / C standard library / Computing / Software bugs / Software engineering

Sweeper: A Lightweight End-to-End System for Defending Against Fast Worms Joseph Tucek Shan Lu, Chengdu Huang, Spiros Xanthos Yuanyuan Zhou

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:29
333Data types / Primitive types / Programming language implementation / Pointer / Control flow / JMP / Trampoline / C / Buffer overflow / Computing / Software engineering / Computer programming

FPGate: The Last Building Block For A Practical CFI Solution Tao Wei1,2 , Chao Zhang2 , Zhaofeng Chen2 , Lei Duan2 , Laszlo Szekeres1 , Stephen McCamant1 , Dawn Song1 1 2

Add to Reading List

Source URL: lenx.100871.net

Language: English - Date: 2013-02-05 05:41:27
334Address space layout randomization / Software quality / Computing / Systems engineering / JIT spraying / Software bugs / Shellcode / Buffer overflow

Chen XiaoBo Defeating windows 7 browser

Add to Reading List

Source URL: powerofcommunity.net

Language: English - Date: 2010-11-18 10:16:18
335Memory management / Computer errors / Software bugs / Computer memory / Buffer overflow protection / Segmentation fault / Buffer overflow / Call stack / GNU Debugger / Computing / Computer programming / Software engineering

Guarded Memory Move (GMM) White Paper VERSION 0.5 Guarded Memory Move (GMM) Buffer Overflow Detection And Analysis Davide Libenzi

Add to Reading List

Source URL: xmailserver.org

Language: English - Date: 2007-02-16 03:03:26
336Software bugs / Debuggers / Buffer overflow / Electronic filter / Filter / Vulnerability / Valgrind / Instruction set / Computing / Computer programming / Cyberwarfare

Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software James Newsome Carnegie Mellon University

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:29
337Security / Malware / Hacking / Software testing / Buffer overflow / Address space layout randomization / Computer worm / Attack / Vulnerability / Computer security / Cyberwarfare / Computer network security

Sting: An End-to-End Self-healing System for Defending against Zero-day Worm Attacks on Commodity Software James Newsome David Brumley

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
338Software quality / Cyberwarfare / Vulnerability / Buffer overflow / Fuzz testing / Stack / Heap overflow / Exploit / Memory safety / Software bugs / Software testing / Computer security

Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications David Brumley, Pongsin Poosankam Dawn Song Jiang Zheng {dbrumley,ppoosank}@cs.cmu.edu

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2013-09-09 05:44:56
UPDATE