Software bugs

Results: 1223



#Item
91Software bugs / Buffer overflow / Open Source Vulnerability Database / Computer security / Computer memory / Morris worm / Memory corruption / Vulnerability / Computer worm / Blackhat

Memory Corruption Attacks The (almost) Complete History thinkst applied research haroon meer

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:53:12
92Computing / Software bugs / Software engineering / Blind return oriented programming / Computer errors / Return-oriented programming / Stack buffer overflow / Return-to-libc attack / Address space layout randomization / Buffer overflow / Shellcode / Stack

Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2016-01-02 20:09:14
93Cryptographic software / Internet security / Object-oriented programming languages / OpenSSL / Data types / Subroutines / Coccinelle / D / Software bug / Scope / Relational operator / Printf format string

Finding Error Handling Bugs in OpenSSL using Coccinelle Julia Lawall∗ , Ben Laurie† , Ren´e Rydhof Hansen‡ , Nicolas Palix∗ and Gilles Muller§ ∗ University of Copenhagen, Email: {julia,npalix}@diku.dk † Goo

Add to Reading List

Source URL: coccinelle.lip6.fr

Language: English - Date: 2012-01-04 11:08:48
94Software bugs / Buffer overflow protection / Buffer overflow / Stack

Pwning (sometimes) with style Dragons’ notes on CTFs Mateusz "j00ru" Jurczyk, Gynvael Coldwind Insomni’hack 2015, Geneva

Add to Reading List

Source URL: j00ru.vexillium.org

Language: English - Date: 2015-03-20 05:43:43
95Software engineering / Computing / Computer programming / Memory management / Software bugs / Programming language implementation / Functional languages / C++ / Pointer / C dynamic memory allocation / Buffer overflow protection / Optimizing compiler

Portable Software Fault Isolation Joshua A. Kroll Computer Science Department Princeton University Princeton, NJ

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2014-05-10 07:53:45
96Computer memory / Computing / Software bugs / Software engineering / Cyberwarfare / Buffer overflow / Program analysis / Control flow graph / Data buffer / Data-flow analysis / Vulnerability

Transformation-aware Exploit Generation using a HICFG Dan Caselden Alex Bazhanyuk Mathias Payer Laszlo Szekeres

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2013-05-16 23:27:09
97Cyberwarfare / Computer security / Computing / Computer network security / Hacking / Software testing / Software bugs / Vulnerability / Heartbleed / Zero-day / Cross-site scripting / Security testing

Website Security Statistics Report 2015 About This Report WhiteHat Security’s Website Security Statistics

Add to Reading List

Source URL: info.whitehatsec.com

Language: English - Date: 2016-02-25 05:35:53
98

Implementing a Verified On-Disk Hash Table Stephanie Wang Abstract As more and more software is written every day, so too are bugs. Software verification is a way of using formal

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2015-06-14 19:45:36
    99Computing / Computer architecture / Memory management / Software bugs / POSIX / Process / C standard library / Exit / Stack buffer overflow / Pointer / Segmentation fault / Stack

    .oO Phrack 49 Oo. Volume Seven, Issue Forty­Nine File 14 of 16 BugTraq, r00t, and Underground.Org  bring you Smashing The Stack For Fun And Profit

    Add to Reading List

    Source URL: inst.eecs.berkeley.edu

    Language: English - Date: 2008-08-26 17:57:09
    100Cyberwarfare / Computer security / Security / Computer network security / Software testing / Software bugs / Hacking / Vulnerability / Buffer overflow protection / Exploit / Attack

    Relative Vulnerability: An Empirical Assurance Metric Crispin Cowan, PhD CTO, Immunix

    Add to Reading List

    Source URL: adam.shostack.org

    Language: English - Date: 2014-06-11 11:49:30
    UPDATE