Randomization

Results: 457



#Item
251Randomness / Randomization / Unmatched count / Microfinance / Microcredit / Science / Development / Design of experiments / Statistics

*Manuscript( Include title, author names and affiliations on page 1 ) Click here to view linked References "List Randomization for Sensitive Behavior: An Application for Measuring Use of Loan Proceeds

Add to Reading List

Source URL: karlan.yale.edu

Language: English - Date: 2011-08-31 13:15:00
252Software bugs / Cross-platform software / Heap spraying / Shellcode / Buffer overflow / Address space layout randomization / NOP slide / JavaScript / Garbage collection / Computing / Cyberwarfare / Computer security

N OZZLE: A Defense Against Heap-spraying Code Injection Attacks Paruj Ratanaworabhan Cornell University Benjamin Livshits

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2009-06-05 22:26:35
253Computer security / Stack buffer overflow / Buffer overflow / Shellcode / Address space layout randomization / Stack / Pointer / PaX / Heap overflow / Software bugs / Computing / Software quality

\x90\x90\x90\x90\x90\x90\x90\x90 Stack Smashing as of Today A State-of-the-Art Overview on Buffer Overflow Protections

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
254Software engineering / Stack buffer overflow / Buffer overflow / Address space layout randomization / PaX / Heap overflow / NX bit / Uncontrolled format string / Stack / Computing / Software bugs / Software quality

Buffer overflows on linux-x86-64 Hagen Fritsch Technische Universit¨at M¨unchen January 22nd, 2009

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
255Mac OS X / Mach / Address space layout randomization / Dynamic linker / Mach-O / Shellcode / Portable Executable / Library / Darwin / Software / Computing / Computer architecture

Fun and Games with Mac OS X and iPhone Payloads Charlie Miller Independent Security Evaluators [removed]

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:30
256Scientific method / Random assignment / Impact evaluation / Randomized controlled trial / Treatment and control groups / Randomized experiment / Sampling / Randomization / Quasi-experiment / Design of experiments / Statistics / Science

Workshop on Impact Evaluation: Theory, Practice and Decision-making Impact Evaluation Methods II Urmy Shukla CLEAR SA / J-PAL SA at IFMR

Add to Reading List

Source URL: www.3ieimpact.org

Language: English - Date: 2014-09-16 09:18:01
257Science / Randomized controlled trial / Randomization / E / Randomized experiment / Design of experiments / Scientific method / Statistics

How to Randomize Nassreena Sampaco-Baddiri Innovations for Poverty Action Philippines 3rd September, 2014

Add to Reading List

Source URL: www.3ieimpact.org

Language: English - Date: 2014-09-16 09:37:39
258Design of experiments / Random number generation / Buffer overflow / Randomization / Computing / Scientific method / Statistics / Randomness / Address space layout randomization / Software bugs

Bypassing ASLR by predicting a process’ randomization Hagen Fritsch January 23nd, 2009

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
259Smartphones / IOS jailbreaking / IOS / Address space layout randomization / Sandbox / SQL injection / IOS version history / System software / Computing / Software

Securing iOS Applications Dr. Bruce Sams, OPTIMAbit GmbH About Me

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-12-16 17:34:42
260Evaluation / Scientific method / Impact evaluation / Field experiment / Random assignment / Experiment / Randomized controlled trial / Design of experiments / Evaluation methods / Science

Use of Randomization to Rigourously Evaluate Development Initiatives: Are the Perceived Obstacles “False Alarms”? Stephen H. Bell

Add to Reading List

Source URL: www.3ieimpact.org

Language: English - Date: 2014-09-17 09:07:29
UPDATE