Return-to-libc attack

Results: 45



#Item
31Software bugs / C Standard Library / Stack buffer overflow / Buffer overflow / Subroutines / Address space layout randomization / Return-to-libc attack / NX bit / Pointer / Computing / Software engineering / Computer programming

2013 IEEE Symposium on Security and Privacy Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2013-05-28 17:28:59
32C Standard Library / Computer errors / Stack buffer overflow / Return-to-libc attack / Address space layout randomization / Buffer overflow / MOV / X86 / Printf format string / Computing / Computer architecture / Software bugs

PDF Document

Add to Reading List

Source URL: force.vnsecurity.net

Language: English - Date: 2010-08-12 21:04:37
33Software engineering / Return-to-libc attack / Address space layout randomization / PaX / Buffer overflow / NX bit / Exec Shield / Stack overflow / Stack / Software bugs / Computing / Software quality

PDF Document

Add to Reading List

Source URL: force.vnsecurity.net

Language: English - Date: 2010-12-31 02:53:49
34System software / Return-to-libc attack / PaX / Address space layout randomization / NX bit / Buffer overflow / Exec Shield / Stack / ASCII / Software bugs / Computing / Software

PDF Document

Add to Reading List

Source URL: force.vnsecurity.net

Language: English - Date: 2010-08-12 21:04:43
35Software bugs / C Standard Library / Return-to-libc attack / Hacking / Software testing / Procedural programming languages / Return-oriented programming / Buffer overflow / Arbitrary code execution / Computing / Cyberwarfare / Computer security

App Store for Massive Scale Software Diversity

Add to Reading List

Source URL: www.marshallplan.at

Language: English - Date: 2012-12-12 21:32:39
36Software bugs / Buffer overflow / Memory safety / Heap overflow / Vulnerability / Uncontrolled format string / Pointer / Return-to-libc attack / Dangling pointer / Computing / Cyberwarfare / Computer security

Runtime countermeasures for code injection attacks against C and C++ programs YVES YOUNAN, WOUTER JOOSEN and FRANK PIESSENS Katholieke Universiteit Leuven The lack of memory-safety in C/C++ often leads to vulnerabilitie

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-02-27 15:05:36
37Software bugs / C Standard Library / System call / Buffer overflow protection / C dynamic memory allocation / Stack buffer overflow / Address space layout randomization / Return-to-libc attack / Pointer / Computing / Software engineering / Computer programming

JITSec: Just-in-time Security for Code Injection Attacks Willem De Groef, Nick Nikiforakis, Yves Younan, and Frank Piessens IBBT-DistriNet Katholieke Universiteit Leuven Celestijnenlaan 200A B3001

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-03-01 01:12:51
38ITunes / IPhone / Software / Address space layout randomization / IOS jailbreaking / Return-to-libc attack / IPad / Pwn2Own / Shellcode / Apple Inc. / Computing / IOS

http://www.sektioneins.de Adding ASLR to jailbroken iPhones Stefan Esser What the talk is NOT about

Add to Reading List

Source URL: antid0te.com

Language: English - Date: 2014-02-28 09:59:45
39Computer programming / Stack buffer overflow / Data types / Buffer overflow / Return-to-libc attack / Primitive types / Address space layout randomization / C standard library / Constructor / Computing / Software bugs / Software engineering

Linux exploit development part 4 - ASCII armor bypass + return-to-plt NOTE: In case you missed my previous papers you can check them out here: Linux exploit development part 1 - Stack overflow Linux Exploit Writing Tuto

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2011-05-14 09:23:46
40Address space layout randomization / Computer file formats / Programming language implementation / Mac OS X / PaX / Return-to-libc attack / Relocation / JIT spraying / Prelink / Software / Computing / System software

Address Space Randomization for Mobile Devices Hristo Bojinov Dan Boneh Rich Cannings

Add to Reading List

Source URL: bojinov.org

Language: English - Date: 2011-03-01 17:48:00
UPDATE