Stack Overflow

Results: 257



#Item
21Computing / Software bugs / Software engineering / Buffer overflow / Computer memory / Address space layout randomization / Stack / Pointer / Uncontrolled format string / Stack buffer overflow

String Oriented Programming Circumventing ASLR, DEP, and other Guards Mathias Payer, ETH Zürich

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
22Computing / Software engineering / Computer programming / C standard library / Software bugs / Computer security / Memory management / Subroutines / Control-flow integrity / Call stack / Stack buffer overflow / Setjmp.h

Control-Flow Bending: On the Effectiveness of Control-Flow Integrity Nicolas Carlini UC Berkeley Antonio Barresi

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
23Software engineering / Computing / Computer programming / Data types / Software bugs / Pointer / Memory safety / Stack buffer overflow / Dangling pointer / C dynamic memory allocation / Cyclone / Buffer overflow

IEEE SECURITY& PRIVACY Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
24

Augmenting API Documentation with Insights from Stack Overflow Christoph Treude Martin P. Robillard

Add to Reading List

Source URL: ctreude.files.wordpress.com

Language: English - Date: 2016-01-29 03:44:18
    25Software / Computing / Computer architecture / Software bugs / PaX / X86 architecture / Address space layout randomization / Position-independent code / Exec Shield / Standard Performance Evaluation Corporation / Stack buffer overflow / X86-64

    Too much PIE is bad for performance Mathias Department of Computer Science, ETH Zurich Abstract Compiling an application as a Position Independent Executable (PIE) enables Address Space L

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    26Computing / Software bugs / Software engineering / Computer programming / Buffer overflow / Stack buffer overflow / Stack / Uncontrolled format string / C dynamic memory allocation / C standard library / Pointer / Integer overflow

    I Control Your Code Attack Vectors through the Eyes of Software-based Fault Isolation Mathias Payer () Department of Computer Science, ETH Zurich Abstract

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    27Computing / Software engineering / Software bugs / Computer programming / Pointer / Stack buffer overflow / Address space layout randomization / Buffer overflow / Dangling pointer / Memory safety / C dynamic memory allocation / Return-to-libc attack

    SoK: Eternal War in Memory L´aszl´o Szekeres† , Mathias Payer‡ , Tao Wei∗‡ , Dawn Song‡ † Stony Brook University ‡ University of California, Berkeley ∗ Peking University

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    28Computing / Software / Software bugs / Programming language implementation / Subroutines / Portable Executable / Position-independent code / Object file / Dynamic linker / Stack buffer overflow / Buffer overflow / Return-to-libc attack

    Retrospective Protection utilizing Binary Rewriting Sergej Proskurin, Fatih Kilic, Claudia Eckert1 Abstract: Buffer overflow vulnerabilities present a common threat. To encounter this issue, operating system support and

    Add to Reading List

    Source URL: www.sec.in.tum.de

    Language: English - Date: 2015-06-23 06:38:59
    29Computing / Software / Computer architecture / Software bugs / Computing platforms / Address space layout randomization / C standard library / PaX / Buffer overflow / Stack buffer overflow / Linux / Android

    Curriculum Vitae Name: Current: Studies: Address:

    Add to Reading List

    Source URL: hmarco.org

    Language: English - Date: 2016-04-07 10:01:31
    30

    Why, When, and What: Analyzing Stack Overflow Questions by Topic, Type, and Code Miltiadis Allamanis, Charles Sutton School of Informatics, University of Edinburgh, Edinburgh EH8 9AB, UK Email: , csut

    Add to Reading List

    Source URL: homepages.inf.ed.ac.uk

    Language: English - Date: 2013-04-01 07:10:58
      UPDATE