<--- Back to Details
First PageDocument Content
Software bugs / X86 architecture / Machine code / Stack buffer overflow / PaX / Return-oriented programming / Buffer overflow / Shellcode / Address space layout randomization / Computer architecture / Computing / X86 instructions
Date: 2010-04-24 20:48:53
Software bugs
X86 architecture
Machine code
Stack buffer overflow
PaX
Return-oriented programming
Buffer overflow
Shellcode
Address space layout randomization
Computer architecture
Computing
X86 instructions

Add to Reading List

Source URL: cseweb.ucsd.edu

Download Document from Source Website

File Size: 398,01 KB

Share Document on Facebook

Similar Documents

Jens Knoop, Uwe Zdun (Hrsg.): Software Engineering 2016, Lecture Notes in Informatics (LNI), Gesellschaft f¨ur Informatik, BonnLearning how to prevent return-oriented programming efficiently David Pfaff 1 Sebas

DocID: 1uSQW - View Document

Computing / Computer security / Software bugs / Address space layout randomization / Gadget / Buffer overflow / Return-to-libc attack / Shellcode / Instruction selection / Position-independent code / NOP / Return-oriented programming

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

DocID: 1rrtf - View Document

Software / Computing / Return-oriented programming / Gadget / Microsoft Gadgets / Calling convention / Assembly language / Blind return oriented programming

PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution Andreas Follner1 , Alexandre Bartel1 , Hui Peng2 , Yu-Chen Chang2 , Kyriakos Ispoglou2 , Mathias Payer2 , and Eric Bodden3 1

DocID: 1rlhb - View Document

Computing / Software engineering / Computer programming / Software bugs / X86 architecture / Buffer overflow / Computer memory / X86-64 / Return-to-libc attack / X86 / Return-oriented programming / NX bit

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

DocID: 1qHLq - View Document

Computer security / Computing / Cyberwarfare / Software bugs / Computer errors / Shellcode / Buffer overflow / Return-oriented programming / Heap overflow / Address space layout randomization / Symbolic execution / Exploit

doi:The idea is to identify security-critical software bugs so they can be fixed first. By Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumle

DocID: 1qEiC - View Document