Position-independent code

Results: 25



#Item
1Q: Exploit Hardening Made Easy  Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
2Cheating the ELF Subversive Dynamic Linking to Libraries the grugq Abstract: Development of feature rich Unix parasites has been severely limited by the inability to reliably access functions external to the host file. U

Cheating the ELF Subversive Dynamic Linking to Libraries the grugq Abstract: Development of feature rich Unix parasites has been severely limited by the inability to reliably access functions external to the host file. U

Add to Reading List

Source URL: grugq.github.io

Language: English - Date: 2015-01-27 19:51:39
3Safe Loading - A Foundation for Secure Execution of Untrusted Programs Mathias Payer ETH Zurich, Switzerland Tobias Hartmann ETH Zurich, Switzerland

Safe Loading - A Foundation for Secure Execution of Untrusted Programs Mathias Payer ETH Zurich, Switzerland Tobias Hartmann ETH Zurich, Switzerland

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
4CAIN: Silently Breaking ASLR in the Cloud Antonio Barresi ETH Zurich Kaveh Razavi VU University Amsterdam

CAIN: Silently Breaking ASLR in the Cloud Antonio Barresi ETH Zurich Kaveh Razavi VU University Amsterdam

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
5Too much PIE is bad for performance Mathias  Department of Computer Science, ETH Zurich Abstract Compiling an application as a Position Independent Executable (PIE) enables Address Space L

Too much PIE is bad for performance Mathias Department of Computer Science, ETH Zurich Abstract Compiling an application as a Position Independent Executable (PIE) enables Address Space L

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
6Retrospective Protection utilizing Binary Rewriting Sergej Proskurin, Fatih Kilic, Claudia Eckert1 Abstract: Buffer overflow vulnerabilities present a common threat. To encounter this issue, operating system support and

Retrospective Protection utilizing Binary Rewriting Sergej Proskurin, Fatih Kilic, Claudia Eckert1 Abstract: Buffer overflow vulnerabilities present a common threat. To encounter this issue, operating system support and

Add to Reading List

Source URL: www.sec.in.tum.de

Language: English - Date: 2015-06-23 06:38:59
7Front of House Coordinator Full-time, 12 Month Position U-M Job Code: U-M Ann Arbor Central Campus UMS, an independent multidisciplinary performing arts presenter with a long and deep affiliation with the Universi

Front of House Coordinator Full-time, 12 Month Position U-M Job Code: U-M Ann Arbor Central Campus UMS, an independent multidisciplinary performing arts presenter with a long and deep affiliation with the Universi

Add to Reading List

Source URL: 3puuzj4cgp0w1zze71361rza.wpengine.netdna-cdn.com

Language: English - Date: 2015-06-23 10:57:54
    8Computer file formats / Compiler construction / Programming language implementation / Relocation / Library / Dynamic-link library / Position-independent code / Linker / Dynamic linker / Software / Computing / System software

    Dynamic Linking and Loading < PAGE >1Chapter XX: Dynamic Linking and Loading $Revision: 2.3 $ $Date: :30:36 $ Dynamic linking defers much of the linking process until a program starts running. It provides

    Add to Reading List

    Source URL: www.iecc.com

    Language: English - Date: 1999-06-14 23:31:35
    9Programming language implementation / Computer file formats / Relocation / Position-independent code / Loader / Library / A.out / Virtual memory / Overlay / Computing / Software / Computer programming

    Loading and overlays < PAGE >1Chapter XX: Loading and overlays $Revision: 2.3 $ $Date: :30:36 $ Loading is the process of bringing a program into main memory so it can run. In this chapter we look at the l

    Add to Reading List

    Source URL: www.iecc.com

    Language: English - Date: 1999-06-14 23:31:35
    10Relocation / Computer file formats / Assembly languages / Computer memory / Instruction set architectures / A.out / Linker / Position-independent code / Object file / Computing / Software / Programming language implementation

    Relocation < PAGE >1Chapter XX: Relocation $Revision: 2.2 $ $Date: :02:35 $ Once a linker has scanned all of the input files to determine segment sizes, symbol definitions and symbol references, figured ou

    Add to Reading List

    Source URL: www.iecc.com

    Language: English - Date: 1999-06-29 21:02:59