Back to Results
First PageMeta Content
Computing platforms / Cross-platform software / Java programming language / Java virtual machine / Java Web Start / Java applet / Java / LiveConnect / HotSpot / Computing / Software / Java platform


  Black Hat Abu Dhabi Exploiting Memory Corruption Vulnerabilities in the Java
Add to Reading List

Document Date: 2012-04-07 14:20:37


Open Document

File Size: 2,96 MB

Share Result on Facebook

City

Abu Dhabi / /

Company

Adobe / Oracle / ACCUVANT LABS / Microsoft / AlwaysOn / Apple / /

Currency

CVE / /

Event

Product Release / /

IndustryTerm

security mitigation technologies / deployed software packages / web browser / few exploit mitigation technologies / exploit mitigation technologies / Web Start / Web Start applications / end-user computer systems / /

OperatingSystem

UNIX / Mac OS X / Windows 7 / Solaris / Linux / Microsoft Windows / /

Organization

Trusted Untrusted / /

Person

Mark Dowd / Peter Van Eeckhoutte / Alexander Sotirov / Joshua J. Drake / /

Position

AUTHOR / Java interpreter / relatively straight forward / /

Product

Java 7 / Java Standard Edition (J2SE) / WinDbg / /

ProgrammingLanguage

Java / C / JavaScript / /

Technology

Virtual Machine / security mitigation technologies / Java / UNIX / Linux / few exploit mitigation technologies / mobile phones / operating system / digital signature / exploit mitigation technologies / /

SocialTag