Return-to-libc attack
Results: 45
# | Item |
---|---|
41![]() | On the Effectiveness of Address-Space Randomization Hovav Shacham Matthew Page Ben PfaffAdd to Reading ListSource URL: benpfaff.orgLanguage: English - Date: 2014-06-05 00:52:52 |
42![]() | Enlisting Hardware Architecture to Thwart Malicious Code Injection Ruby B. Lee, David K. Karig, John P. McGregor, and Zhijie ShiAdd to Reading ListSource URL: palms.ee.princeton.eduLanguage: English - Date: 2004-07-02 15:00:06 |
43![]() | kBouncer: Efficient and Transparent ROP Mitigation Vasilis Pappas Columbia UniversityAdd to Reading ListSource URL: www.cs.columbia.eduLanguage: English - Date: 2012-08-05 22:16:20 |
44![]() | PDF DocumentAdd to Reading ListSource URL: www.infosecwriters.comLanguage: English - Date: 2005-08-07 21:09:55 |
45![]() | PDF DocumentAdd to Reading ListSource URL: seclab.cs.sunysb.eduLanguage: English - Date: 2009-01-19 10:51:06 |