Stack buffer overflow

Results: 195



#Item
21reflections on witty by Nicholas Weaver Nicholas Weaver is a postdoctoral researcher at the

reflections on witty by Nicholas Weaver Nicholas Weaver is a postdoctoral researcher at the

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:03
22EECS 388 Intro to Computer Security October 24, 2014 Project 4: Application Security

EECS 388 Intro to Computer Security October 24, 2014 Project 4: Application Security

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2014-12-24 15:06:41
23Microsoft Word - CWEs_as_vuln_theory.doc

Microsoft Word - CWEs_as_vuln_theory.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-07-18 14:25:17
242013 IEEE Symposium on Security and Privacy  Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

2013 IEEE Symposium on Security and Privacy Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

Add to Reading List

Source URL: wwwx.cs.unc.edu

Language: English - Date: 2014-09-05 15:38:44
25Data Structures  David Morgan A list

Data Structures David Morgan A list

Add to Reading List

Source URL: homepage.smc.edu

Language: English - Date: 2014-05-03 04:37:46
26The following paper was originally published in the Proceedings of the 7th USENIX Security Symposium San Antonio, Texas, January 26-29, 1998 StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Atta

The following paper was originally published in the Proceedings of the 7th USENIX Security Symposium San Antonio, Texas, January 26-29, 1998 StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Atta

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2002-04-30 18:05:07
27Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

Add to Reading List

Source URL: www.scs.stanford.edu

- Date: 2014-05-19 16:48:47
    28Poster: Targeted Therapy for Program Bugs Qiang Zeng Mingyi Zhao  Peng Liu

    Poster: Targeted Therapy for Program Bugs Qiang Zeng Mingyi Zhao Peng Liu

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2014-05-07 16:20:28
    29Out Of Control: Overcoming Control-Flow Integrity Enes Gökta¸s∗ Elias Athanasopoulos†  Vrije Universiteit

    Out Of Control: Overcoming Control-Flow Integrity Enes Gökta¸s∗ Elias Athanasopoulos† Vrije Universiteit

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2014-04-21 13:48:10
    30CS 155: Spring 2014 June 9, 2014 CS 155 Final Exam This exam is open book and open notes. You may use course notes and documents that you have stored on a laptop, but you may NOT use the network connection on your laptop

    CS 155: Spring 2014 June 9, 2014 CS 155 Final Exam This exam is open book and open notes. You may use course notes and documents that you have stored on a laptop, but you may NOT use the network connection on your laptop

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2015-05-18 15:16:38