<--- Back to Details
First PageDocument Content
Software bugs / Pointer / C / Vulnerability / Heap overflow / Application security / OWASP / Computing / Software engineering / Computer programming
Date: 2014-12-16 19:06:10
Software bugs
Pointer
C
Vulnerability
Heap overflow
Application security
OWASP
Computing
Software engineering
Computer programming

LeafSR_BlackHat_2014_Webcast

Add to Reading List

Source URL: www.blackhat.com

Download Document from Source Website

File Size: 734,47 KB

Share Document on Facebook

Similar Documents

Heap and BSS Overflow Ⅱ Arbro on-02-19

DocID: 1uD4u - View Document

Computer security / Computing / Cyberwarfare / Software bugs / Computer errors / Shellcode / Buffer overflow / Return-oriented programming / Heap overflow / Address space layout randomization / Symbolic execution / Exploit

doi:The idea is to identify security-critical software bugs so they can be fixed first. By Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumle

DocID: 1qEiC - View Document

Computing / Software engineering / Software bugs / Computer programming / Computer memory / C standard library / Address space layout randomization / Buffer overflow / Heap overflow / C dynamic memory allocation / Pointer / Memory safety

Data Randomization Cristian Cadar Microsoft Research Cambridge, UK

DocID: 1qxLg - View Document

Software bugs / Computing / Software engineering / Computer programming / Computer errors / Subroutines / Memory management / Stack / Buffer overflow / Call stack / Stack buffer overflow

b The heap sucks The Stack is Back – Jon Oberheide

DocID: 1pRdF - View Document

Web browsers / Pwn2Own / Hacking / Vulnerability / Safari / Heap spraying / Google Chrome / Exploit / Buffer overflow / Arbitrary code execution / Internet Explorer / Privilege escalation

$hell on Earth: From Browser to System Compromise Matt Molinyawe, Abdul-Aziz Hariri, and Jasiel Spelman A Zero Day Initiative Research Paper

DocID: 1p8BX - View Document