Address space layout randomization

Results: 175



#Item
151Computer programming / Buffer overflow / Pointer / Address space layout randomization / Stack / Shellcode / C / Uncontrolled format string / Memory corruption / Computing / Software bugs / Software engineering

0 CPM: Masking Code Pointers to Prevent Code Injection Attacks PIETER PHILIPPAERTS, YVES YOUNAN, STIJN MUYLLE and FRANK PIESSENS, DistriNet Research Group, University of Leuven SVEN LACHMUND and THOMAS WALTER, DOCOMO Eu

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-11-05 16:02:36
152Cyberwarfare / Buffer overflow protection / Stack buffer overflow / Buffer overflow / PaX / Address space layout randomization / Circular buffer / Pointer / Uncontrolled format string / Computing / Software bugs / Computer security

Breaking the memory secrecy assumption Raoul Strackx Yves Younan Pieter Philippaerts

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-03-01 01:14:43
153Software bugs / C Standard Library / System call / Buffer overflow protection / C dynamic memory allocation / Stack buffer overflow / Address space layout randomization / Return-to-libc attack / Pointer / Computing / Software engineering / Computer programming

JITSec: Just-in-time Security for Code Injection Attacks Willem De Groef, Nick Nikiforakis, Yves Younan, and Frank Piessens IBBT-DistriNet Katholieke Universiteit Leuven Celestijnenlaan 200A B3001

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-03-01 01:12:51
154Software bugs / Stack buffer overflow / Buffer overflow / Pointer / Function prologue / Shellcode / Stack / C / Address space layout randomization / Computing / Software engineering / Computer programming

Code Pointer Masking: Hardening Applications against Code Injection Attacks Pieter Philippaerts1 , Yves Younan1 , Stijn Muylle1 , Frank Piessens1 , Sven Lachmund2 , and Thomas Walter2 1

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-02-27 15:06:43
155Software bugs / Memory management / Computer errors / Buffer overflow protection / Stack buffer overflow / Buffer overflow / C Standard Library / Address space layout randomization / PaX / Computing / Software engineering / Computer programming

               

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-03-01 01:23:17
156Software bugs / Heap spraying / Buffer overflow / Shellcode / Address space layout randomization / NOP slide / Cross-site request forgery / NOP / JavaScript / Cyberwarfare / Computing / Computer security

BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks Francesco Gadaleta, Yves Younan, and Wouter Joosen IBBT-Distrinet, Katholieke Universiteit Leuven, 3001, Leuven Belgium Abstract. Web brows

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-02-27 15:06:55
157Smartphones / IOS jailbreaking / IPhone / Privilege escalation / Address space layout randomization / IOS / Sandbox / Linux kernel / Charlie Miller / Software / System software / Computing

Apple iOS 4 Security Evaluation Dino A. Dai Zovi Trail of Bits LLC Disclaimers I have never worked for Apple, but I have a crippling addiction to

Add to Reading List

Source URL: trailofbits.files.wordpress.com

Language: English - Date: 2011-08-10 11:14:53
158ITunes / IPhone / Software / Address space layout randomization / IOS jailbreaking / Return-to-libc attack / IPad / Pwn2Own / Shellcode / Apple Inc. / Computing / IOS

http://www.sektioneins.de Adding ASLR to jailbroken iPhones Stefan Esser What the talk is NOT about

Add to Reading List

Source URL: antid0te.com

Language: English - Date: 2014-02-28 09:59:45
159Memory management / Data Execution Prevention / Control flow / X86 architecture / NX bit / Buffer overflow / Address space layout randomization / Heap overflow / Stack buffer overflow / Computing / Software bugs / Computer errors

Bypassing Browser Memory Protections Setting back browser security by 10 years Alexander Sotirov Mark Dowd Introduction

Add to Reading List

Source URL: www.phreedom.org

Language: English - Date: 2013-06-01 20:57:45
160Computer programming / Stack buffer overflow / Data types / Buffer overflow / Return-to-libc attack / Primitive types / Address space layout randomization / C standard library / Constructor / Computing / Software bugs / Software engineering

Linux exploit development part 4 - ASCII armor bypass + return-to-plt NOTE: In case you missed my previous papers you can check them out here: Linux exploit development part 1 - Stack overflow Linux Exploit Writing Tuto

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2011-05-14 09:23:46
UPDATE