Stack buffer overflow

Results: 195



#Item
51

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:33
52Paradyn Parallel Performance Tools  StackwalkerAPI Programmer’s Guide 8.2 Release Aug 2014

Paradyn Parallel Performance Tools StackwalkerAPI Programmer’s Guide 8.2 Release Aug 2014

Add to Reading List

Source URL: www.paradyn.org

Language: English - Date: 2014-08-19 15:19:30
53CIS 331 Introduction to Networks & Security Tuesday, March 25 Project 4: Application Security

CIS 331 Introduction to Networks & Security Tuesday, March 25 Project 4: Application Security

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2014-11-18 15:19:13
541  Preprint: the final version of this paper will appear in the Proceedings of ACSAC’07 The Age of Data: pinpointing guilty bytes in polymorphic buffer overflows on heap or stack

1 Preprint: the final version of this paper will appear in the Proceedings of ACSAC’07 The Age of Data: pinpointing guilty bytes in polymorphic buffer overflows on heap or stack

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2008-10-21 09:36:37
55CIS 331 Introduction to Networks & Security Tuesday, March 31 Project 4: Application Security

CIS 331 Introduction to Networks & Security Tuesday, March 31 Project 4: Application Security

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2015-03-30 23:29:05
56Defeating the Stack Based Buffer Overflow Prevention Mechanism of Microsoft Windows 2003 Server. David Litchfield () 8th September 2003

Defeating the Stack Based Buffer Overflow Prevention Mechanism of Microsoft Windows 2003 Server. David Litchfield () 8th September 2003

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:21
57Return-Oriented Programming: Systems, Languages, and Applications RYAN ROEMER, ERIK BUCHANAN, HOVAV SHACHAM and STEFAN SAVAGE University of California, San Diego  We introduce return-oriented programming, a technique by

Return-Oriented Programming: Systems, Languages, and Applications RYAN ROEMER, ERIK BUCHANAN, HOVAV SHACHAM and STEFAN SAVAGE University of California, San Diego We introduce return-oriented programming, a technique by

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2011-07-08 15:31:37
58Randomized Instruction Set Emulation ∗ to Disrupt Binary Code Injection Attacks Elena Gabriela Barrantes  David H. Ackley

Randomized Instruction Set Emulation ∗ to Disrupt Binary Code Injection Attacks Elena Gabriela Barrantes David H. Ackley

Add to Reading List

Source URL: www.cs.unm.edu

Language: English - Date: 2003-09-09 13:38:33
59Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade* Crispin Cowan, Perry Wagle, Calton Pu, Steve Beattie, and Jonathan Walpole Department of Computer Science and Engineering Oregon Graduate Instit

Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade* Crispin Cowan, Perry Wagle, Calton Pu, Steve Beattie, and Jonathan Walpole Department of Computer Science and Engineering Oregon Graduate Instit

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2013-04-04 20:24:06
60WORM vs. WORM: Preliminary Study of an Active Counter-Attack Mechanism ∗† Frank Castaneda ˜

WORM vs. WORM: Preliminary Study of an Active Counter-Attack Mechanism ∗† Frank Castaneda ˜

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2004-11-02 14:39:42