Return-to-libc attack

Results: 45



#Item
41Software / C Standard Library / Address space layout randomization / PaX / Return-to-libc attack / Stack buffer overflow / Grsecurity / Buffer overflow / Prelink / Computing / Computer security / Software bugs

On the Effectiveness of Address-Space Randomization Hovav Shacham Matthew Page Ben Pfaff

Add to Reading List

Source URL: benpfaff.org

Language: English - Date: 2014-06-05 00:52:52
42Computer programming / Stack buffer overflow / Buffer overflow protection / Buffer overflow / Stack / Call stack / Subroutine / Pointer / Return-to-libc attack / Software bugs / Computing / Software engineering

Enlisting Hardware Architecture to Thwart Malicious Code Injection Ruby B. Lee, David K. Karig, John P. McGregor, and Zhijie Shi

Add to Reading List

Source URL: palms.ee.princeton.edu

Language: English - Date: 2004-07-02 15:00:06
43C Standard Library / Software bugs / X86 architecture / Central processing unit / Memory management / Return-to-libc attack / PaX / Return-oriented programming / Buffer overflow / Computing / Computer programming / Computer security

kBouncer: Efficient and Transparent ROP Mitigation Vasilis Pappas Columbia University

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2012-08-05 22:16:20
44Software bugs / Debuggers / C Standard Library / Computer errors / GNU Debugger / Segmentation fault / Buffer overflow protection / Return-to-libc attack / Buffer overflow / Computing / Software / Computer programming

PDF Document

Add to Reading List

Source URL: www.infosecwriters.com

Language: English - Date: 2005-08-07 21:09:55
45Computer programming / Address space layout randomization / PaX / Buffer overflow / Position-independent code / Stack buffer overflow / Return-to-libc attack / Memory safety / C dynamic memory allocation / Computing / Software bugs / Software

PDF Document

Add to Reading List

Source URL: seclab.cs.sunysb.edu

Language: English - Date: 2009-01-19 10:51:06
UPDATE