Stack Overflow

Results: 257



#Item
61Software bugs / X86 architecture / Computer programming / Assembly languages / Computer errors / MOV / Buffer overflow / Shellcode / Stack buffer overflow / Computing / X86 instructions / Software engineering

Variations in Exploit methods between Linux and Windows David Litchfieldth July 2003 This paper will examine the differences and commonality in the way a vulnerability common to both Windows a

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:39
62Software bugs / Memory safety / Pointer / Stack buffer overflow / PaX / Buffer overflow / C / Vulnerability / Debugging / Computing / Software engineering / Computer programming

MemSherlock: An Automated Debugger for Unknown Memory Corruption Vulnerabilities ∗ Emre C. Sezer Peng Ning Chongkyung Kil Department of Computer Science

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:03
63Stack buffer overflow / Buffer overflow / Stack / Address space layout randomization / Memory address / Atmel AVR / Malware / Pointer / Transmission Control Protocol / Computing / Software bugs / Computer errors

Code Injection Attacks on Harvard-Architecture Devices Aurélien Francillon Claude Castelluccia INRIA Rhône-Alpes

Add to Reading List

Source URL: planete.inrialpes.fr

Language: English - Date: 2008-09-11 06:46:35
64Software bugs / Memory management / Buffer overflow / Pointer / X86 memory segmentation / C / Stack / X86 / Virtual memory / Computing / Software engineering / Computer programming

Program semantics-Aware Intrusion Detection Prof. Tzi-cker Chiueh Computer Science Department Stony Brook University

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:40
65Software quality / Stack buffer overflow / Buffer overflow protection / Buffer overflow / Address space layout randomization / PaX / Heap overflow / Return-to-libc attack / Exec Shield / Software bugs / Computing / Computer security

(un) Smashing the Stack: 66ee66dd66bb 33aa6e

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:26
66Hacking / Software bugs / Computer network security / Software testing / Vulnerability / Buffer overflow / SQL injection / Stack buffer overflow / Cross-site scripting / Computing / Cyberwarfare / Computer security

Software Bugs: Distribution, Exploitation and the Future Felix ‘FX’ Lindner, Recurity Labs GmbH, Introduction Significant research efforts were undertaken in the last years to detect and prevent

Add to Reading List

Source URL: www.recurity-labs.com

Language: English - Date: 2009-06-15 11:36:06
67Software bugs / Data types / Computer errors / Primitive types / Arrays / Buffer overflow protection / Buffer overflow / Stack buffer overflow / Memory safety / Computing / Software engineering / Computer programming

A Practical Dynamic Buffer Overflow Detector Olatunji Ruwase Monica S. Lam Transmeta Corporation

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:32
68Software bugs / Computer errors / Assembly languages / Buffer overflow / Stack buffer overflow / Denial-of-service attack / Stack / Call stack / Address space layout randomization / Computing / Software engineering / Computer programming

Automatic Diagnosis and Response to Memory Corruption Vulnerabilities Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris Bookholt Cyber Defense Laboratory Department of Computer Science North Carolina State University

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:02
69Computer programming / Computer errors / Address space layout randomization / Buffer overflow / C / Segmentation fault / Stack / Return-to-libc attack / Stack buffer overflow / Computing / Software bugs / Software engineering

Computer Science HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure Vulnerabilities Jason Gionta, William Enck,

Add to Reading List

Source URL: gionta.org

Language: English - Date: 2015-03-05 07:19:22
70Cyberwarfare / Buffer overflow / Exploit / GNU Debugger / Stack / Buffer overflow protection / Shellcode / Software bugs / Computing / Computer programming

CS 395, Section 22 Introduction to Computer Systems Dinda, Fall 2001

Add to Reading List

Source URL: www.cs.northwestern.edu

Language: English - Date: 2003-01-31 17:41:14
UPDATE