<--- Back to Details
First PageDocument Content
Software engineering / Stack buffer overflow / Buffer overflow / Address space layout randomization / PaX / Heap overflow / NX bit / Uncontrolled format string / Stack / Computing / Software bugs / Software quality
Date: 2015-05-28 15:51:33
Software engineering
Stack buffer overflow
Buffer overflow
Address space layout randomization
PaX
Heap overflow
NX bit
Uncontrolled format string
Stack
Computing
Software bugs
Software quality

Add to Reading List

Source URL: www.blackhat.com

Download Document from Source Website

File Size: 152,97 KB

Share Document on Facebook

Similar Documents

Computing / Software engineering / Computer programming / Type theory / Data types / Cross-platform software / Object-oriented programming languages / C standard library / Printf format string / Comparison of programming languages / Uncontrolled format string / Type system

A Format String Checker for Java Konstantin Weitz Siwakorn Srisakaokul University of Washington, USA

DocID: 1qbF4 - View Document

Computer network security / Hacking / Code audit / Information technology audit / Vulnerability / Cross-site scripting / SQL injection / Web application security / Code injection / Uncontrolled format string / Application security / Computer security

Finding Security Vulnerabilities in Java Applications with Static Analysis Benjamin Livshits and Monica S. Lam Computer Science Department

DocID: 1oWV6 - View Document

Computing / Software engineering / Software / Software bugs / Buffer overflow / Stack buffer overflow / Address space layout randomization / PaX / Uncontrolled format string / Pointer / Stack / Printf format string

String Oriented Programming Circumventing ASLR, DEP, and Other Guards Mathias Payer ETH Zurich, Switzerland

DocID: 1o4C4 - View Document

Computing / Computer security / Software / Software bugs / C standard library / Address space layout randomization / Return-oriented programming / Stack buffer overflow / Return-to-libc attack / Buffer overflow / PaX / Uncontrolled format string

String Oriented Programming: When ASLR is not Enough Mathias Payer Thomas R. Gross Department of Computer Science

DocID: 1nObE - View Document

Computing / Software bugs / Software engineering / Buffer overflow / Computer memory / Address space layout randomization / Stack / Pointer / Uncontrolled format string / Stack buffer overflow

String Oriented Programming Circumventing ASLR, DEP, and other Guards Mathias Payer, ETH Zürich

DocID: 1nCPz - View Document