Position-independent code

Results: 25



#Item
1Computing / Computer security / Software bugs / Address space layout randomization / Gadget / Buffer overflow / Return-to-libc attack / Shellcode / Instruction selection / Position-independent code / NOP / Return-oriented programming

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
2Programming language implementation / Compilers / Computer file formats / Dynamic linker / Dynamic loading / Data types / Library / Linker / Relocation / Portable Executable / Loader / Position-independent code

Cheating the ELF Subversive Dynamic Linking to Libraries the grugq Abstract: Development of feature rich Unix parasites has been severely limited by the inability to reliably access functions external to the host file. U

Add to Reading List

Source URL: grugq.github.io

Language: English - Date: 2015-01-27 19:51:39
3Programming language implementation / Compilers / Compiler construction / Loader / Library / Static library / Linker / Position-independent code / Portable Executable / Dynamic linker / Relocation / Software

Safe Loading - A Foundation for Secure Execution of Untrusted Programs Mathias Payer ETH Zurich, Switzerland Tobias Hartmann ETH Zurich, Switzerland

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
4Computer memory / Address space layout randomization / Kernel same-page merging / Entropy / Data deduplication / Position-independent code / Paging / Return-oriented programming / Virtual machine / Relocation / Prelink / CPU cache

CAIN: Silently Breaking ASLR in the Cloud Antonio Barresi ETH Zurich Kaveh Razavi VU University Amsterdam

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
5Software / Computing / Computer architecture / Software bugs / PaX / X86 architecture / Address space layout randomization / Position-independent code / Exec Shield / Standard Performance Evaluation Corporation / Stack buffer overflow / X86-64

Too much PIE is bad for performance Mathias Department of Computer Science, ETH Zurich Abstract Compiling an application as a Position Independent Executable (PIE) enables Address Space L

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
6Computing / Software / Software bugs / Programming language implementation / Subroutines / Portable Executable / Position-independent code / Object file / Dynamic linker / Stack buffer overflow / Buffer overflow / Return-to-libc attack

Retrospective Protection utilizing Binary Rewriting Sergej Proskurin, Fatih Kilic, Claudia Eckert1 Abstract: Buffer overflow vulnerabilities present a common threat. To encounter this issue, operating system support and

Add to Reading List

Source URL: www.sec.in.tum.de

Language: English - Date: 2015-06-23 06:38:59
7

Front of House Coordinator Full-time, 12 Month Position U-M Job Code: U-M Ann Arbor Central Campus UMS, an independent multidisciplinary performing arts presenter with a long and deep affiliation with the Universi

Add to Reading List

Source URL: 3puuzj4cgp0w1zze71361rza.wpengine.netdna-cdn.com

Language: English - Date: 2015-06-23 10:57:54
    8Computer file formats / Compiler construction / Programming language implementation / Relocation / Library / Dynamic-link library / Position-independent code / Linker / Dynamic linker / Software / Computing / System software

    Dynamic Linking and Loading < PAGE >1Chapter XX: Dynamic Linking and Loading $Revision: 2.3 $ $Date: :30:36 $ Dynamic linking defers much of the linking process until a program starts running. It provides

    Add to Reading List

    Source URL: www.iecc.com

    Language: English - Date: 1999-06-14 23:31:35
    9Programming language implementation / Computer file formats / Relocation / Position-independent code / Loader / Library / A.out / Virtual memory / Overlay / Computing / Software / Computer programming

    Loading and overlays < PAGE >1Chapter XX: Loading and overlays $Revision: 2.3 $ $Date: :30:36 $ Loading is the process of bringing a program into main memory so it can run. In this chapter we look at the l

    Add to Reading List

    Source URL: www.iecc.com

    Language: English - Date: 1999-06-14 23:31:35
    10Relocation / Computer file formats / Assembly languages / Computer memory / Instruction set architectures / A.out / Linker / Position-independent code / Object file / Computing / Software / Programming language implementation

    Relocation < PAGE >1Chapter XX: Relocation $Revision: 2.2 $ $Date: :02:35 $ Once a linker has scanned all of the input files to determine segment sizes, symbol definitions and symbol references, figured ou

    Add to Reading List

    Source URL: www.iecc.com

    Language: English - Date: 1999-06-29 21:02:59
    UPDATE