Stack buffer overflow

Results: 195



#Item
31CSRuntime Defenses Scribe Notes – Ashima Atul) Runtime Instrumentation Techniques All runtime instrumentation techniques protect the integrity of the application. They can be exploited by Denial-of-Servic

CSRuntime Defenses Scribe Notes – Ashima Atul) Runtime Instrumentation Techniques All runtime instrumentation techniques protect the integrity of the application. They can be exploited by Denial-of-Servic

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:42
32CS 161  Fall 2005 Computer Security

CS 161 Fall 2005 Computer Security

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2005-12-11 05:02:06
33ConMem: Detecting Severe Concurrency Bugs through an Effect-Oriented Approach Wei Zhang Chong Sun

ConMem: Detecting Severe Concurrency Bugs through an Effect-Oriented Approach Wei Zhang Chong Sun

Add to Reading List

Source URL: people.cs.uchicago.edu

Language: English - Date: 2010-01-19 14:05:40
34The shellcode basically resolves kernel32 functions, downloads, and executes xx

The shellcode basically resolves kernel32 functions, downloads, and executes xx

Add to Reading List

Source URL: www.mnin.org

Language: English - Date: 2007-03-30 15:11:52
35A stack buffer overflow vulnerability exists in the

A stack buffer overflow vulnerability exists in the

Add to Reading List

Source URL: www.mnin.org

Language: English - Date: 2006-10-21 04:10:32
3610061872_blended_attacks_wp.qxp

10061872_blended_attacks_wp.qxp

Add to Reading List

Source URL: www.cse.msu.edu

Language: English - Date: 2004-07-12 15:53:15
37David Litchfield Database Security - The Pot and the Kettle This talk will examine the database server offerings from both Microsoft and Oracle and show that, regardless of certification, market campaigns and slurs, each

David Litchfield Database Security - The Pot and the Kettle This talk will examine the database server offerings from both Microsoft and Oracle and show that, regardless of certification, market campaigns and slurs, each

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:21
38Variations in Exploit methods between Linux and Windows David Litchfieldth July 2003 This paper will examine the differences and commonality in the way a vulnerability common to both Windows a

Variations in Exploit methods between Linux and Windows David Litchfieldth July 2003 This paper will examine the differences and commonality in the way a vulnerability common to both Windows a

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:39
39MemSherlock: An Automated Debugger for Unknown Memory Corruption Vulnerabilities ∗ Emre C. Sezer Peng Ning Chongkyung Kil Department of Computer Science

MemSherlock: An Automated Debugger for Unknown Memory Corruption Vulnerabilities ∗ Emre C. Sezer Peng Ning Chongkyung Kil Department of Computer Science

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:03
40Code Injection Attacks on Harvard-Architecture Devices Aurélien Francillon Claude Castelluccia  INRIA Rhône-Alpes

Code Injection Attacks on Harvard-Architecture Devices Aurélien Francillon Claude Castelluccia INRIA Rhône-Alpes

Add to Reading List

Source URL: planete.inrialpes.fr

Language: English - Date: 2008-09-11 06:46:35