String Buffer

Results: 87



#Item
71C Standard Library / Computer errors / Stack buffer overflow / Return-to-libc attack / Address space layout randomization / Buffer overflow / MOV / X86 / Printf format string / Computing / Computer architecture / Software bugs

PDF Document

Add to Reading List

Source URL: force.vnsecurity.net

Language: English - Date: 2010-08-12 21:04:37
72Security / Software testing / Hacking / Vulnerability / CVSS / Security testing / Buffer overflow / Attack / Uncontrolled format string / Cyberwarfare / Computer security / Computer network security

Microsoft Word - unforgivable 3.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-09-13 16:51:18
73Security / Software testing / Hacking / Vulnerability / CVSS / Security testing / Buffer overflow / Attack / Uncontrolled format string / Cyberwarfare / Computer security / Computer network security

Microsoft Word - unforgivable 3.doc

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-09-10 12:41:21
74Computer programming / Buffer overflow / Pointer / Address space layout randomization / Stack / Shellcode / C / Uncontrolled format string / Memory corruption / Computing / Software bugs / Software engineering

0 CPM: Masking Code Pointers to Prevent Code Injection Attacks PIETER PHILIPPAERTS, YVES YOUNAN, STIJN MUYLLE and FRANK PIESSENS, DistriNet Research Group, University of Leuven SVEN LACHMUND and THOMAS WALTER, DOCOMO Eu

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-11-05 16:02:36
75Software bugs / Buffer overflow / Memory safety / Heap overflow / Vulnerability / Uncontrolled format string / Pointer / Return-to-libc attack / Dangling pointer / Computing / Cyberwarfare / Computer security

Runtime countermeasures for code injection attacks against C and C++ programs YVES YOUNAN, WOUTER JOOSEN and FRANK PIESSENS Katholieke Universiteit Leuven The lack of memory-safety in C/C++ often leads to vulnerabilitie

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-02-27 15:05:36
76Cyberwarfare / Buffer overflow protection / Stack buffer overflow / Buffer overflow / PaX / Address space layout randomization / Circular buffer / Pointer / Uncontrolled format string / Computing / Software bugs / Computer security

Breaking the memory secrecy assumption Raoul Strackx Yves Younan Pieter Philippaerts

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-03-01 01:14:43
77Computer security / Memory management / Buffer overflow protection / Buffer overflow / Memory safety / Stack buffer overflow / PaX / Uncontrolled format string / C dynamic memory allocation / Computing / Software bugs / Software engineering

Protecting global and static variables from buffer overflow attacks Yves Younan Frank Piessens Wouter Joosen

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-03-01 01:16:09
78Cyberwarfare / Buffer overflow protection / Buffer overflow / Vulnerability / PaX / Uncontrolled format string / Stack / C dynamic memory allocation / Shellcode / Software bugs / Computer security / Computing

PDF Document

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-02-25 04:08:30
79Computer network security / Software testing / Buffer overflow / Uncontrolled format string / Vulnerability / Cisco IOS / Cross-site scripting / Secure coding / JavaScript / Cyberwarfare / Computing / Computer security

Secure Coding Guide Contents Introduction to Secure Coding Guide 7 At a Glance 7

Add to Reading List

Source URL: developer.apple.com

Language: English - Date: 2014-03-11 00:58:28
80Computer programming / Priority queue / Queue / Circular buffer / Pointer / C++ classes / List / Sequence container / String / Abstract data types / Computing / Software engineering

21 21 Collections of data As illustrated in the "Air Traffic Controller" example in Chapter 20, arrays can be used to store collections of data. But arrays do have limitations (e.g. you have to specify a maximum size), a

Add to Reading List

Source URL: www.uow.edu.au

Language: English - Date: 2001-01-07 17:04:59
UPDATE