Address space layout randomization

Results: 175



#Item
31Programming language implementation / Cross-platform software / Procedural programming languages / C Standard Library / PaX / Address space layout randomization / Software bugs / JIT spraying / Compiler optimization / Computing / Software engineering / Software

SoK: Automated Software Diversity Per Larsen, Andrei Homescu, Stefan Brunthaler, Michael Franz University of California, Irvine Abstract—The idea of automatic software diversity is at least two decades old. The defici

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-04-21 13:48:10
32Patch / Software maintenance / Relocation / Object file / Library / Data differencing / Portable Executable / Address space layout randomization / Stack / Computing / Software / System software

Katana: Towards Patching as a Runtime part of the Compiler-Linker-Loader Toolchain Sergey Bratus, James Oakley, Ashwin Ramaswamy, Sean W. Smith1 Computer Science Dept. Dartmouth College Hanover, New Hampshire

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2011-07-11 16:41:08
33Linux / LXC / PaX / Address space layout randomization / Linux kernel / User space / OpenVZ / System software / Software / AppArmor

  Brad Spengler / grsecurity

Add to Reading List

Source URL: grsecurity.net

Language: English - Date: 2010-07-31 12:32:40
34Stack buffer overflow / Buffer overflow / Stack / Address space layout randomization / Memory address / Atmel AVR / Malware / Pointer / Transmission Control Protocol / Computing / Software bugs / Computer errors

Code Injection Attacks on Harvard-Architecture Devices Aurélien Francillon Claude Castelluccia INRIA Rhône-Alpes

Add to Reading List

Source URL: planete.inrialpes.fr

Language: English - Date: 2008-09-11 06:46:35
35Software quality / Stack buffer overflow / Buffer overflow protection / Buffer overflow / Address space layout randomization / PaX / Heap overflow / Return-to-libc attack / Exec Shield / Software bugs / Computing / Computer security

(un) Smashing the Stack: 66ee66dd66bb 33aa6e

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:26
36Hacking / Software testing / Vulnerability / Exploit / Address space layout randomization / Zero / Computer security / Cyberwarfare / Failure

Taming wild copies From hopeless crash to working exploit Taming wild copies From hopeless crash to working

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2015-03-27 04:19:46
37Software engineering / C Standard Library / C dynamic memory allocation / Memory management / Heap spraying / Address space layout randomization / Heap feng shui / Alexander Sotirov / Buffer overflow protection / Computing / Computer programming / Software bugs

Advanced Heap Manipulation in Windows 8 Zhenhua(Eric) Liu VERSION 1.2 Contents

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-04-01 08:11:01
38Central processing unit / Instruction set / Address space layout randomization / Subroutine / Software bugs / Computer programming / Computing / Software engineering

Instruction Set Filters and Other Exploit Defenses Changing the architecture to make exploitation harder. Taylor Hornby Michael Locasto

Add to Reading List

Source URL: defuse.ca

Language: English - Date: 2013-10-29 20:03:22
39Software bugs / C Standard Library / Memory management / Address space layout randomization / PaX / C dynamic memory allocation / Exec Shield / Return-to-libc attack / Relocation / Computing / Computer programming / Software

Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software Chongkyung Kil∗, Jinsuk Jun∗, Christopher Bookholt∗, Jun Xu†, Peng Ning∗ Department of Computer Science∗ North

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:57
40Software bugs / Computer errors / Assembly languages / Buffer overflow / Stack buffer overflow / Denial-of-service attack / Stack / Call stack / Address space layout randomization / Computing / Software engineering / Computer programming

Automatic Diagnosis and Response to Memory Corruption Vulnerabilities Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris Bookholt Cyber Defense Laboratory Department of Computer Science North Carolina State University

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:02
UPDATE