Randomization

Results: 457



#Item
421Memory management / Data Execution Prevention / Control flow / X86 architecture / NX bit / Buffer overflow / Address space layout randomization / Heap overflow / Stack buffer overflow / Computing / Software bugs / Computer errors

Bypassing Browser Memory Protections Setting back browser security by 10 years Alexander Sotirov Mark Dowd Introduction

Add to Reading List

Source URL: www.phreedom.org

Language: English - Date: 2013-06-01 20:57:45
422Computer programming / Stack buffer overflow / Data types / Buffer overflow / Return-to-libc attack / Primitive types / Address space layout randomization / C standard library / Constructor / Computing / Software bugs / Software engineering

Linux exploit development part 4 - ASCII armor bypass + return-to-plt NOTE: In case you missed my previous papers you can check them out here: Linux exploit development part 1 - Stack overflow Linux Exploit Writing Tuto

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2011-05-14 09:23:46
423Address space layout randomization / Computer file formats / Programming language implementation / Mac OS X / PaX / Return-to-libc attack / Relocation / JIT spraying / Prelink / Software / Computing / System software

Address Space Randomization for Mobile Devices Hristo Bojinov Dan Boneh Rich Cannings

Add to Reading List

Source URL: bojinov.org

Language: English - Date: 2011-03-01 17:48:00
424Software / C Standard Library / Address space layout randomization / PaX / Return-to-libc attack / Stack buffer overflow / Grsecurity / Buffer overflow / Prelink / Computing / Computer security / Software bugs

On the Effectiveness of Address-Space Randomization Hovav Shacham Matthew Page Ben Pfaff

Add to Reading List

Source URL: benpfaff.org

Language: English - Date: 2014-06-05 00:52:52
425Computing / Heap / System software / Memory management / Address space layout randomization / C dynamic memory allocation

iOS 6 Kernel Security: A Hacker’s Guide by Mark Dowd and Tarjei Mandt [removed] [removed]

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-01-19 23:15:46
426Multi-touch / Smartphones / Address space layout randomization / Cisco IOS / Patch / Microsoft Reader / Application security / IOS / Microsoft Windows / Software / Computing / Computer security

Take Advantage of Software Improvements Why Upgrade? Software security countermeasures are reactive in nature and evolve with the attack landscape. As

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2013-11-21 11:30:44
427Science / Randomized controlled trial / Randomization / Randomized experiment / Mendelian randomization / Design of experiments / Statistics / Scientific method

Microsoft Word - prevention standards final draft appendix 02 methodology annex 03 designs.doc

Add to Reading List

Source URL: www.unodc.org

Language: English - Date: 2013-03-10 09:24:10
428Antivirus software / Software testing / Malware / Address space layout randomization / Exploit / Vulnerability / Attack / Computer virus / Data Execution Prevention / Computer security / Cyberwarfare / Computer network security

Anti-Exploitation Features Cyber attackers want access to your sensitive information or intellectual property for strategic advantage, or more commonly, for monetary gain. They commonly attempt to exploit vulnerabilitie

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2013-11-21 11:32:47
429Systems engineering / Quality / Quality control / Optimal design / Restricted randomization / Randomized block design / Factorial experiment / Statistical power / Fractional factorial design / Statistics / Design of experiments / Statistical methods

JMP Design of Experiments (DOE) Fit the design to the problem, not the problem to the design The JMP DOE

Add to Reading List

Source URL: www.jmp.com

Language: English - Date: 2007-09-21 09:52:36
430Factorial experiment / Completely randomized design / Analysis of variance / Randomized experiment / Fractional factorial design / Optimal design / Blocking / Confounding / Factorial / Statistics / Design of experiments / Restricted randomization

QTEC4104(fm-bm):QTEC4003(fm/bm)

Add to Reading List

Source URL: www.jmp.com

Language: English - Date: 2010-02-11 09:37:05
UPDATE