<--- Back to Details
First PageDocument Content
Memory management / Data Execution Prevention / Control flow / X86 architecture / NX bit / Buffer overflow / Address space layout randomization / Heap overflow / Stack buffer overflow / Computing / Software bugs / Computer errors
Date: 2010-04-10 04:10:26
Memory management
Data Execution Prevention
Control flow
X86 architecture
NX bit
Buffer overflow
Address space layout randomization
Heap overflow
Stack buffer overflow
Computing
Software bugs
Computer errors

Bypassing Browser Memory Protections

Add to Reading List

Source URL: www.azimuthsecurity.com

Download Document from Source Website

File Size: 684,07 KB

Share Document on Facebook

Similar Documents

Formal methods / Software engineering / Computing / Logic in computer science / Non-interference / Exception handling / Formal verification / Refinement / Thread / Futures and promises / Covert channel / Application programming interface

Nickel: A Framework for Design and Verification of Information Flow Control Systems Helgi Sigurbjarnarson, Luke Nelson, Bruno Castro-Karney, James Bornholt, Emina Torlak, Xi Wang University of Washington

DocID: 1xVUp - View Document

Computing / Computer memory / Hardware acceleration / Central processing unit / Parallel computing / Computer hardware / Dynamic random-access memory / Computer architecture / Field-programmable gate array

FPGAs as Streaming MIMD Machines for Data Analy9cs James Thomas, Matei Zaharia, Pat Hanrahan CPU/GPU Control Flow Divergence

DocID: 1xVnb - View Document

Efficient RAM and control flow in verifiable outsourced computation Riad S. Wahby⋆ , Srinath Setty† , Zuocheng Ren† , Andrew J. Blumberg† , and Michael Walfish⋆ ⋆ †

DocID: 1xVic - View Document

Software engineering / Subroutines / Computing / Computer programming / Programming paradigms / Callback / Network flow problem / Event / Data-flow analysis / Control flow analysis / Flow network / Control flow graph

Static Control-Flow Analysis of User-Driven Callbacks in Android Applications Shengqian Yang, Dacong Yan, Haowei Wu, Yan Wang, and Atanas Rountev Ohio State University Email: {yangs,yan,wuhaow,wang10,rountev}@cse.ohio-st

DocID: 1xVap - View Document

Aircraft instruments / Standards / Covert channel / Steganography / ARINC 653 / ARINC / Verification / Human behavior / Technology / User interface design / Design

Nickel A Framework for Design and Verification of Information Flow Control Systems Helgi Sigurbjarnarson, Luke Nelson, Bruno Castro-Karney, James Bornholt, Emina Torlak, and Xi Wang

DocID: 1xV5v - View Document