Return-oriented programming

Results: 50



#Item
1

Jens Knoop, Uwe Zdun (Hrsg.): Software Engineering 2016, Lecture Notes in Informatics (LNI), Gesellschaft f¨ur Informatik, BonnLearning how to prevent return-oriented programming efficiently David Pfaff 1 Sebas

Add to Reading List

Source URL: subs.emis.de

Language: English - Date: 2016-02-25 13:12:58
    2Computing / Computer security / Software bugs / Address space layout randomization / Gadget / Buffer overflow / Return-to-libc attack / Shellcode / Instruction selection / Position-independent code / NOP / Return-oriented programming

    Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

    Add to Reading List

    Source URL: users.ece.cmu.edu

    Language: English - Date: 2014-05-29 15:38:01
    3Software / Computing / Return-oriented programming / Gadget / Microsoft Gadgets / Calling convention / Assembly language / Blind return oriented programming

    PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution Andreas Follner1 , Alexandre Bartel1 , Hui Peng2 , Yu-Chen Chang2 , Kyriakos Ispoglou2 , Mathias Payer2 , and Eric Bodden3 1

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-08-21 12:57:21
    4Computing / Software engineering / Computer programming / Software bugs / X86 architecture / Buffer overflow / Computer memory / X86-64 / Return-to-libc attack / X86 / Return-oriented programming / NX bit

    Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

    Add to Reading List

    Source URL: css.csail.mit.edu

    Language: English - Date: 2016-01-29 11:50:05
    5Computer security / Computing / Cyberwarfare / Software bugs / Computer errors / Shellcode / Buffer overflow / Return-oriented programming / Heap overflow / Address space layout randomization / Symbolic execution / Exploit

    doi:The idea is to identify security-critical software bugs so they can be fixed first. By Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumle

    Add to Reading List

    Source URL: users.ece.cmu.edu

    Language: English - Date: 2014-05-29 15:38:01
    6Software engineering / Computer programming / Computing / Subroutines / Computer security / Software bugs / Memory management / Return-oriented programming / Control-flow integrity / Control flow / Call stack / Gadget

    2015 IEEE Trustcom/BigDataSE/ISPA Loop-Oriented Programming: A New Code Reuse Attack to Bypass Modern Defenses Bingchen Lan, Yan Li, Hao Sun, Chao Su, Yao Liu, Qingkai Zeng

    Add to Reading List

    Source URL: www.sec.in.tum.de

    Language: English - Date: 2016-04-22 03:46:05
    7Cybercrime / E-commerce / Cyberwarfare / Computer network security / Address space layout randomization / Return-oriented programming / PaX / Computer security / Exploit / Timing attack / Side-channel attack / Phishing

    Moving Target Techniques: Leveraging Uncertainty for Cyber Defense Hamed Okhravi, William W. Streilein, and Kevin S. Bauer Cyber moving target techniques involve

    Add to Reading List

    Source URL: www.ll.mit.edu

    Language: English - Date: 2016-07-12 15:04:32
    8Software bugs / Buffer overflow protection / Buffer overflow / Return-to-libc attack / Stack / Subroutine / C standard library / Stack buffer overflow / Return-oriented programming

    Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

    Add to Reading List

    Source URL: css.csail.mit.edu

    Language: English - Date: 2016-01-29 11:50:05
    9Central processing unit / Machine code / Software bugs / Return-oriented programming / Computer memory / Instruction set architectures / Buffer overflow protection / Self-modifying code / Subroutine / Stack / Return-to-libc attack / Instruction set

    CFIMon: Detecting Violation of Control Flow Integrity using Performance Counters Yubin Xia† ‡, Yutao Liu† ‡, Haibo Chen†, Binyu Zang‡ †Institute of Parallel and Distributed Systems, Shanghai Jiao Tong Unive

    Add to Reading List

    Source URL: ipads.se.sjtu.edu.cn

    Language: English - Date: 2012-08-23 22:16:01
    10Computing / Computer security / Software / Software bugs / C standard library / Address space layout randomization / Return-oriented programming / Stack buffer overflow / Return-to-libc attack / Buffer overflow / PaX / Uncontrolled format string

    String Oriented Programming: When ASLR is not Enough Mathias Payer Thomas R. Gross Department of Computer Science

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    UPDATE