Randomization

Results: 457



#Item
91Software bugs / C Standard Library / Stack buffer overflow / Buffer overflow / Subroutines / Address space layout randomization / Return-to-libc attack / NX bit / Pointer / Computing / Software engineering / Computer programming

2013 IEEE Symposium on Security and Privacy Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

Add to Reading List

Source URL: wwwx.cs.unc.edu

Language: English - Date: 2014-09-05 15:38:44
92Behavior / Nutrition / Birth control / Family / Fertility / Pregnancy / Mendelian randomization / Obesity / Avon Longitudinal Study of Parents and Children / Health / Medicine / Epidemiology

Activity 2.2.3_final report

Add to Reading List

Source URL: www.metabolic-programming.org

Language: English - Date: 2013-05-22 07:07:45
93Software bugs / Malware / PaX / Buffer overflow / Return-to-libc attack / Vulnerability / Address space layout randomization / Computer virus / Subroutine / Computing / Computer programming / Software engineering

Program Differentiation-INTERACT-2010-v6-publish

Add to Reading List

Source URL: www.cs.fsu.edu

Language: English - Date: 2010-02-17 09:21:07
94

Practical Control Flow Integrity & Randomization for Binary Executables Chao Zhang1 , Tao Wei1,2∗ , Zhaofeng Chen1 , Lei Duan1 , L´aszl´o Szekeres2,3+ , Stephen McCamant2,4+ , Dawn Song2 , Wei Zou1 1 Beijing Key Lab

Add to Reading List

Source URL: seclab.cs.sunysb.edu

- Date: 2014-07-10 01:53:32
    95

    2013 IEEE Symposium on Security and Privacy Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2013-04-05 19:56:58
      96

      2013 IEEE Symposium on Security and Privacy Practical Control Flow Integrity & Randomization for Binary Executables Chao Zhang1 , Tao Wei1,2∗ , Zhaofeng Chen1 , Lei Duan1 , L´aszl´o Szekeres2,3+ , Stephen McCamant2,

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2013-04-05 19:56:56
        97

        Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization

        Add to Reading List

        Source URL: ieee-security.org

        Language: English - Date: 2012-05-22 01:36:10
          98

          APPROX 2011 and RANDOM 2011 14th Intl. Workshop on Approximation Algorithms for Combinatorial Optimization Problems - APPROX 2011 15th Intl. Workshop on Randomization and Computation - RANDOM 2011 http://cui.unige.ch/tcs

          Add to Reading List

          Source URL: cui.unige.ch

          Language: English - Date: 2011-08-13 11:42:49
            99

            Forward Induction and Public Randomization† Faruk Gul Northwestern University and David G. Pearce

            Add to Reading List

            Source URL: www.princeton.edu

            Language: English - Date: 1999-12-02 09:34:03
              100

              Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization

              Add to Reading List

              Source URL: www.ieee-security.org

              Language: English - Date: 2012-05-22 01:36:10
                UPDATE