Return-to-libc attack

Results: 45



#Item
11Out Of Control: Overcoming Control-Flow Integrity Enes Gökta¸s∗ Elias Athanasopoulos†  Vrije Universiteit

Out Of Control: Overcoming Control-Flow Integrity Enes Gökta¸s∗ Elias Athanasopoulos† Vrije Universiteit

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-04-21 13:48:10
12(un) Smashing the Stack: 66ee66dd66bb 33aa6e

(un) Smashing the Stack: 66ee66dd66bb 33aa6e

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:26
13Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage Stephen Checkoway UC San Diego  Ariel J. Feldman

Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage Stephen Checkoway UC San Diego Ariel J. Feldman

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-08-10 01:55:31
14Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software Chongkyung Kil∗, Jinsuk Jun∗, Christopher Bookholt∗, Jun Xu†, Peng Ning∗ Department of Computer Science∗ North

Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software Chongkyung Kil∗, Jinsuk Jun∗, Christopher Bookholt∗, Jun Xu†, Peng Ning∗ Department of Computer Science∗ North

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:57
15Computer Science  HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure Vulnerabilities Jason Gionta, William Enck,

Computer Science HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure Vulnerabilities Jason Gionta, William Enck,

Add to Reading List

Source URL: gionta.org

Language: English - Date: 2015-03-05 07:19:22
16Size Does Matter/Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard

Size Does Matter/Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-09-10 08:46:40
17

PDF Document

Add to Reading List

Source URL: forum.stanford.edu

Language: English - Date: 2010-05-27 13:55:09
18

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:11
19

PDF Document

Add to Reading List

Source URL: pax.grsecurity.net

Language: English - Date: 2012-06-03 20:41:41
20Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2014-08-24 01:28:14