Shellcode

Results: 175



#Item
51Noah / Shellcode / Human geography / Culture / Entertainment / Computer network security / Honeypot / Spamming

SIXTH FRAMEWORK PROGRAMME Structuring the European Research Area Specific Programme RESEARCH INFRASTRUCTURES ACTION Contract No. RIDS

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2008-11-07 07:20:04
52Computing / McAfee / Hacking / Computer network security / Malware / Targeted threat / Shellcode / Network security / Intrusion prevention system / Cyberwarfare / Computer security / Advanced persistent threat

White Paper Combating Advanced Persistent Threats How to prevent, detect, and remediate APTs Table of Contents

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:07:53
53Computer programming / PaX / Buffer overflow protection / Stack buffer overflow / Valgrind / Buffer overflow / Shellcode / X86 / Executable / Computing / Software bugs / Computer security

Randomized Instruction Set Emulation ∗ to Disrupt Binary Code Injection Attacks Elena Gabriela Barrantes David H. Ackley

Add to Reading List

Source URL: www.cs.unm.edu

Language: English - Date: 2003-09-09 13:38:33
54Shellcode / Heap spraying / Heap overflow / Software testing / Computer network security / Arbitrary code execution / Address space layout randomization / Exploit / Vulnerability / Cyberwarfare / Computer security / Failure

Detecting Web Browser Heap Corruption Attacks Stephan Chenette Moti Joseph

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
55Software bugs / Process / Shellcode / Emulator / Honeypot / Buffer overflow / Client honeypot / Fork / QEMU / Computing / Software / System software

Eudaemon: Involuntary and On-Demand Emulation Against Zero-Day Exploits Georgios Portokalidis Herbert Bos

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2008-10-21 09:31:23
56IEEE 802.11 / Shellcode

Device Drivers: Don’t build a house on a shaky foundation johnny cache, researcher david maynor, SecureWorks

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
57Batch file / Exploit / System call / Dave Aitel / Command Prompt / Security token / Exec / Computing / Scripting languages / Shellcode

MOSDEF Dave Aitel Immunity, Inc http://www.immunitysec.com Who am I?

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:30
58Software bugs / Process / Shellcode / Emulator / Honeypot / Buffer overflow / Client honeypot / Fork / QEMU / Computing / Software / System software

Eudaemon: Involuntary and On-Demand Emulation Against Zero-Day Exploits Georgios Portokalidis Herbert Bos

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2008-03-11 00:44:06
59IEEE 802.11 / Technology / Hacking / Software testing / Beacon frame / Wireless LAN / Shellcode / Buffer overflow / Vulnerability / Wireless networking / Cyberwarfare / Computer security

Remote and Local Exploitation of Network Drivers Yuriy Bulygin Intel Corporation Security Center of Excellence (SeCoE) JF4-318, 2111 NE 25th Ave, Hillsboro, OR, USA

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
60Address space layout randomization / NOP / Computer architecture / Computing / Exploit / Shellcode / JIT spraying / Machine code

JIT-SPRAY Attacks & Advanced Shellcode HITBSecConf 2010, Amsterdam Alexey Sintsov

Add to Reading List

Source URL: www.dsecrg.com

Language: English - Date: 2013-11-14 10:23:32
UPDATE