Stack buffer overflow

Results: 195



#Item
41Program semantics-Aware Intrusion Detection Prof. Tzi-cker Chiueh Computer Science Department Stony Brook University

Program semantics-Aware Intrusion Detection Prof. Tzi-cker Chiueh Computer Science Department Stony Brook University

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:40
42(un) Smashing the Stack: 66ee66dd66bb 33aa6e

(un) Smashing the Stack: 66ee66dd66bb 33aa6e

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:26
43Software Bugs: Distribution, Exploitation and the Future Felix ‘FX’ Lindner, Recurity Labs GmbH,  Introduction Significant research efforts were undertaken in the last years to detect and prevent

Software Bugs: Distribution, Exploitation and the Future Felix ‘FX’ Lindner, Recurity Labs GmbH, Introduction Significant research efforts were undertaken in the last years to detect and prevent

Add to Reading List

Source URL: www.recurity-labs.com

Language: English - Date: 2009-06-15 11:36:06
44A Practical Dynamic Buffer Overflow Detector Olatunji Ruwase Monica S. Lam  Transmeta Corporation

A Practical Dynamic Buffer Overflow Detector Olatunji Ruwase Monica S. Lam Transmeta Corporation

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:32
45Automatic Diagnosis and Response to Memory Corruption Vulnerabilities Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris Bookholt Cyber Defense Laboratory Department of Computer Science North Carolina State University

Automatic Diagnosis and Response to Memory Corruption Vulnerabilities Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris Bookholt Cyber Defense Laboratory Department of Computer Science North Carolina State University

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:02
46Computer Science  HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure Vulnerabilities Jason Gionta, William Enck,

Computer Science HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure Vulnerabilities Jason Gionta, William Enck,

Add to Reading List

Source URL: gionta.org

Language: English - Date: 2015-03-05 07:19:22
47CS 395, Section 22  Introduction to Computer Systems Dinda, Fall 2001

CS 395, Section 22 Introduction to Computer Systems Dinda, Fall 2001

Add to Reading List

Source URL: www.cs.northwestern.edu

Language: English - Date: 2003-01-31 17:41:14
48Size Does Matter/Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard

Size Does Matter/Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-09-10 08:46:40
49

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:11
50Vulnerability Advisory – Vendor Disclosure Name TestDisk check_OS2MB Stack Buffer overflow  Vendor Website

Vulnerability Advisory – Vendor Disclosure Name TestDisk check_OS2MB Stack Buffer overflow Vendor Website

Add to Reading List

Source URL: www.security-assessment.com

Language: English - Date: 2015-04-30 00:52:34