Stack buffer overflow

Results: 195



#Item
11IEEE  SECURITY& PRIVACY Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page

IEEE SECURITY& PRIVACY Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
12Too much PIE is bad for performance Mathias  Department of Computer Science, ETH Zurich Abstract Compiling an application as a Position Independent Executable (PIE) enables Address Space L

Too much PIE is bad for performance Mathias Department of Computer Science, ETH Zurich Abstract Compiling an application as a Position Independent Executable (PIE) enables Address Space L

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
13I Control Your Code Attack Vectors through the Eyes of Software-based Fault Isolation Mathias Payer () Department of Computer Science, ETH Zurich Abstract

I Control Your Code Attack Vectors through the Eyes of Software-based Fault Isolation Mathias Payer () Department of Computer Science, ETH Zurich Abstract

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
14SoK: Eternal War in Memory L´aszl´o Szekeres† , Mathias Payer‡ , Tao Wei∗‡ , Dawn Song‡ † Stony Brook University ‡ University of California, Berkeley ∗ Peking University

SoK: Eternal War in Memory L´aszl´o Szekeres† , Mathias Payer‡ , Tao Wei∗‡ , Dawn Song‡ † Stony Brook University ‡ University of California, Berkeley ∗ Peking University

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
15Retrospective Protection utilizing Binary Rewriting Sergej Proskurin, Fatih Kilic, Claudia Eckert1 Abstract: Buffer overflow vulnerabilities present a common threat. To encounter this issue, operating system support and

Retrospective Protection utilizing Binary Rewriting Sergej Proskurin, Fatih Kilic, Claudia Eckert1 Abstract: Buffer overflow vulnerabilities present a common threat. To encounter this issue, operating system support and

Add to Reading List

Source URL: www.sec.in.tum.de

Language: English - Date: 2015-06-23 06:38:59
16Curriculum Vitae Name: Current: Studies:  Address:

Curriculum Vitae Name: Current: Studies: Address:

Add to Reading List

Source URL: hmarco.org

Language: English - Date: 2016-04-07 10:01:31
17Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2016-01-02 20:09:14
18Pwning (sometimes) with style Dragons’ notes on CTFs Mateusz

Pwning (sometimes) with style Dragons’ notes on CTFs Mateusz "j00ru" Jurczyk, Gynvael Coldwind Insomni’hack 2015, Geneva

Add to Reading List

Source URL: j00ru.vexillium.org

Language: English - Date: 2015-03-20 05:43:43
19.oO Phrack 49 Oo. Volume Seven, Issue Forty­Nine File 14 of 16 BugTraq, r00t, and Underground.Org  bring you  Smashing The Stack For Fun And Profit

.oO Phrack 49 Oo. Volume Seven, Issue Forty­Nine File 14 of 16 BugTraq, r00t, and Underground.Org  bring you Smashing The Stack For Fun And Profit

Add to Reading List

Source URL: inst.eecs.berkeley.edu

Language: English - Date: 2008-08-26 17:57:09
20Framing Signals—A Return to Portable Shellcode Erik Bosman Vrije Universiteit Amsterdam

Framing Signals—A Return to Portable Shellcode Erik Bosman Vrije Universiteit Amsterdam

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2014-03-24 10:31:12