<--- Back to Details
First PageDocument Content
Software testing / Hacking / Robert C. Seacord / Computer network security / Vulnerability / Secure coding / Buffer overflow / Application security / Uncontrolled format string / Cyberwarfare / Computer security / Security
Date: 2013-09-18 13:11:17
Software testing
Hacking
Robert C. Seacord
Computer network security
Vulnerability
Secure coding
Buffer overflow
Application security
Uncontrolled format string
Cyberwarfare
Computer security
Security

Overview Security Injection Modules

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 962,71 KB

Share Document on Facebook

Similar Documents

Computing / Software engineering / Computer programming / Type theory / Data types / Cross-platform software / Object-oriented programming languages / C standard library / Printf format string / Comparison of programming languages / Uncontrolled format string / Type system

A Format String Checker for Java Konstantin Weitz Siwakorn Srisakaokul University of Washington, USA

DocID: 1qbF4 - View Document

Computer network security / Hacking / Code audit / Information technology audit / Vulnerability / Cross-site scripting / SQL injection / Web application security / Code injection / Uncontrolled format string / Application security / Computer security

Finding Security Vulnerabilities in Java Applications with Static Analysis Benjamin Livshits and Monica S. Lam Computer Science Department

DocID: 1oWV6 - View Document

Computing / Software engineering / Software / Software bugs / Buffer overflow / Stack buffer overflow / Address space layout randomization / PaX / Uncontrolled format string / Pointer / Stack / Printf format string

String Oriented Programming Circumventing ASLR, DEP, and Other Guards Mathias Payer ETH Zurich, Switzerland

DocID: 1o4C4 - View Document

Computing / Computer security / Software / Software bugs / C standard library / Address space layout randomization / Return-oriented programming / Stack buffer overflow / Return-to-libc attack / Buffer overflow / PaX / Uncontrolled format string

String Oriented Programming: When ASLR is not Enough Mathias Payer Thomas R. Gross Department of Computer Science

DocID: 1nObE - View Document

Computing / Software bugs / Software engineering / Buffer overflow / Computer memory / Address space layout randomization / Stack / Pointer / Uncontrolled format string / Stack buffer overflow

String Oriented Programming Circumventing ASLR, DEP, and other Guards Mathias Payer, ETH Zürich

DocID: 1nCPz - View Document