<--- Back to Details
First PageDocument Content
Computing / Computer architecture / Computer security / Software bugs / Machine code / X86 architecture / X86 instructions / Return-oriented programming / Stack buffer overflow / PaX / Shellcode / Buffer overflow
Date: 2018-06-10 15:29:33
Computing
Computer architecture
Computer security
Software bugs
Machine code
X86 architecture
X86 instructions
Return-oriented programming
Stack buffer overflow
PaX
Shellcode
Buffer overflow

Full version of an extended abstract published in Proceedings of ACM CCS 2007, ACM Press, The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86) Hovav Shacham∗ hovav@cs.

Add to Reading List

Source URL: hovav.net

Download Document from Source Website

File Size: 398,01 KB

Share Document on Facebook

Similar Documents

Network-Level Polymorphic Shellcode Detection Using Emulation Michalis Polychronakis1 , Kostas G. Anagnostakis2 , and Evangelos P. Markatos1 1  Institute of Computer Science, Foundation for Research & Technology – Hell

Network-Level Polymorphic Shellcode Detection Using Emulation Michalis Polychronakis1 , Kostas G. Anagnostakis2 , and Evangelos P. Markatos1 1 Institute of Computer Science, Foundation for Research & Technology – Hell

DocID: 1tgZi - View Document

ShellNoob Because writing shellcode is fun, but sometimes painful Black Hat USA Arsenal 2013

ShellNoob Because writing shellcode is fun, but sometimes painful Black Hat USA Arsenal 2013

DocID: 1tfIa - View Document

http://www.nologin.org  Understanding Windows Shellcode skape

http://www.nologin.org Understanding Windows Shellcode skape

DocID: 1temb - View Document

Look Mom, I don’t use Shellcode Browser Exploitation Case Study for Internet Explorer 11 Moritz Jodeit (@moritzj)  Agenda

Look Mom, I don’t use Shellcode Browser Exploitation Case Study for Internet Explorer 11 Moritz Jodeit (@moritzj) Agenda

DocID: 1sSdc - View Document