Stack Overflow

Results: 257



#Item
81Software bugs / Subroutines / Assembly languages / Central processing unit / Machine code / Calling convention / X86 assembly language / Buffer overflow protection / Stack buffer overflow / Computing / Computer architecture / Software engineering

Return-Oriented Programming: Systems, Languages, and Applications RYAN ROEMER, ERIK BUCHANAN, HOVAV SHACHAM and STEFAN SAVAGE University of California, San Diego We introduce return-oriented programming, a technique by

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2011-07-08 15:31:37
82Computer programming / PaX / Buffer overflow protection / Stack buffer overflow / Valgrind / Buffer overflow / Shellcode / X86 / Executable / Computing / Software bugs / Computer security

Randomized Instruction Set Emulation ∗ to Disrupt Binary Code Injection Attacks Elena Gabriela Barrantes David H. Ackley

Add to Reading List

Source URL: www.cs.unm.edu

Language: English - Date: 2003-09-09 13:38:33
83Computer programming / Buffer overflow protection / Buffer overflow / Stack buffer overflow / C standard library / Code audit / Pointer / C / Stack / Computing / Software bugs / Software engineering

Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade* Crispin Cowan, Perry Wagle, Calton Pu, Steve Beattie, and Jonathan Walpole Department of Computer Science and Engineering Oregon Graduate Instit

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2013-04-04 20:24:06
84Welchia / Anti-worm / SQL Slammer / Witty / Code Red / Blaster / Morris worm / Computer virus / Stack buffer overflow / Malware / System software / Computer worms

WORM vs. WORM: Preliminary Study of an Active Counter-Attack Mechanism ∗† Frank Castaneda ˜

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2004-11-02 14:39:42
85Cyberwarfare / PaX / Buffer overflow / Stack buffer overflow / Vulnerability / Application security / Formal methods / Malware / Static program analysis / Software bugs / Computer security / Computing

Software Security: A Formal Perspective (Notes for a Talk) Mart´ın Abadi1,2 1 2

Add to Reading List

Source URL: fm2012.cnam.fr

Language: English - Date: 2012-06-26 10:13:21
86Computer errors / Machine code / Memory management / Segmentation fault / Stack buffer overflow / Buffer overflow protection / Buffer overflow / Pointer / Brainfuck / Computing / Software bugs / Software engineering

Defeating the Stack Based Buffer Overflow Prevention Mechanism of Microsoft Windows 2003 Server. David Litchfield () 8th September 2003

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:30
87Software bugs / PaX / Buffer overflow / Stack buffer overflow / Code injection / Vulnerability / Stack / Malware / Cross-site scripting / Computer security / Computing / Cyberwarfare

Microsoft Word - f07-Just.doc

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2004-11-02 14:34:57
88Software quality / Stack buffer overflow / Address space layout randomization / Buffer overflow protection / Return-to-libc attack / Buffer overflow / Stack / Shellcode / FALSE / Computing / Software bugs / Software engineering

Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2014-08-24 01:28:14
89Software bugs / Data types / Primitive types / Procedural programming languages / Pointer / Buffer overflow / C / Subroutine / Stack / Computing / Software engineering / Computer programming

Safe and Secure Software An Invitation to Ada

Add to Reading List

Source URL: www.adacore.com

Language: English - Date: 2012-03-22 11:48:12
90Monolithic kernels / Embedded operating systems / FreeBSD / NetBSD / Linux kernel / Buffer overflow / Berkeley Software Distribution / Kernel / Operating system / Computing / Software / System software

Binding the Daemon FreeBSD Kernel Stack and Heap Exploitation Patroklos (argp) Argyroudis

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:42:30
UPDATE