<--- Back to Details
First PageDocument Content
Software bugs / C Standard Library / Uncontrolled format string / Printf format string / Buffer overflow / Vulnerability / String / C / Printf / Computing / Software engineering / Computer programming
Date: 2007-12-10 09:46:07
Software bugs
C Standard Library
Uncontrolled format string
Printf format string
Buffer overflow
Vulnerability
String
C
Printf
Computing
Software engineering
Computer programming

Add to Reading List

Source URL: julianor.tripod.com

Download Document from Source Website

File Size: 228,89 KB

Share Document on Facebook

Similar Documents

Computing / Software engineering / Computer programming / Type theory / Data types / Cross-platform software / Object-oriented programming languages / C standard library / Printf format string / Comparison of programming languages / Uncontrolled format string / Type system

A Format String Checker for Java Konstantin Weitz Siwakorn Srisakaokul University of Washington, USA

DocID: 1qbF4 - View Document

Computer network security / Hacking / Code audit / Information technology audit / Vulnerability / Cross-site scripting / SQL injection / Web application security / Code injection / Uncontrolled format string / Application security / Computer security

Finding Security Vulnerabilities in Java Applications with Static Analysis Benjamin Livshits and Monica S. Lam Computer Science Department

DocID: 1oWV6 - View Document

Computing / Software engineering / Software / Software bugs / Buffer overflow / Stack buffer overflow / Address space layout randomization / PaX / Uncontrolled format string / Pointer / Stack / Printf format string

String Oriented Programming Circumventing ASLR, DEP, and Other Guards Mathias Payer ETH Zurich, Switzerland

DocID: 1o4C4 - View Document

Computing / Computer security / Software / Software bugs / C standard library / Address space layout randomization / Return-oriented programming / Stack buffer overflow / Return-to-libc attack / Buffer overflow / PaX / Uncontrolled format string

String Oriented Programming: When ASLR is not Enough Mathias Payer Thomas R. Gross Department of Computer Science

DocID: 1nObE - View Document

Computing / Software bugs / Software engineering / Buffer overflow / Computer memory / Address space layout randomization / Stack / Pointer / Uncontrolled format string / Stack buffer overflow

String Oriented Programming Circumventing ASLR, DEP, and other Guards Mathias Payer, ETH Zürich

DocID: 1nCPz - View Document