Return-to-libc attack

Results: 45



#Item
312013 IEEE Symposium on Security and Privacy  Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

2013 IEEE Symposium on Security and Privacy Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2013-05-28 17:28:59
32

PDF Document

Add to Reading List

Source URL: force.vnsecurity.net

Language: English - Date: 2010-08-12 21:04:37
33

PDF Document

Add to Reading List

Source URL: force.vnsecurity.net

Language: English - Date: 2010-12-31 02:53:49
34

PDF Document

Add to Reading List

Source URL: force.vnsecurity.net

Language: English - Date: 2010-08-12 21:04:43
35App Store for Massive Scale Software Diversity

App Store for Massive Scale Software Diversity

Add to Reading List

Source URL: www.marshallplan.at

Language: English - Date: 2012-12-12 21:32:39
36Runtime countermeasures for code injection attacks against C and C++ programs YVES YOUNAN, WOUTER JOOSEN and FRANK PIESSENS Katholieke Universiteit Leuven  The lack of memory-safety in C/C++ often leads to vulnerabilitie

Runtime countermeasures for code injection attacks against C and C++ programs YVES YOUNAN, WOUTER JOOSEN and FRANK PIESSENS Katholieke Universiteit Leuven The lack of memory-safety in C/C++ often leads to vulnerabilitie

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-02-27 15:05:36
37JITSec: Just-in-time Security for Code Injection Attacks Willem De Groef, Nick Nikiforakis, Yves Younan, and Frank Piessens IBBT-DistriNet Katholieke Universiteit Leuven Celestijnenlaan 200A B3001

JITSec: Just-in-time Security for Code Injection Attacks Willem De Groef, Nick Nikiforakis, Yves Younan, and Frank Piessens IBBT-DistriNet Katholieke Universiteit Leuven Celestijnenlaan 200A B3001

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-03-01 01:12:51
38http://www.sektioneins.de  Adding ASLR to jailbroken iPhones Stefan Esser <stefan.esser@sektioneins.de>  What the talk is NOT about

http://www.sektioneins.de Adding ASLR to jailbroken iPhones Stefan Esser What the talk is NOT about

Add to Reading List

Source URL: antid0te.com

Language: English - Date: 2014-02-28 09:59:45
39Linux exploit development part 4 - ASCII armor bypass + return-to-plt  NOTE: In case you missed my previous papers you can check them out here: Linux exploit development part 1 - Stack overflow Linux Exploit Writing Tuto

Linux exploit development part 4 - ASCII armor bypass + return-to-plt NOTE: In case you missed my previous papers you can check them out here: Linux exploit development part 1 - Stack overflow Linux Exploit Writing Tuto

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2011-05-14 09:23:46
40Address Space Randomization for Mobile Devices Hristo Bojinov Dan Boneh  Rich Cannings

Address Space Randomization for Mobile Devices Hristo Bojinov Dan Boneh Rich Cannings

Add to Reading List

Source URL: bojinov.org

Language: English - Date: 2011-03-01 17:48:00