Buffer overflow

Results: 538



#Item
21Cross-platform software / Common Weakness Enumeration / Software bugs / CWE / Buffer overflow / Pointer / C / Dereference operator / Java

STONESOUP Securely Taking On Software of Uncertain Provenance Intelligence Advanced Research Projects Activity STONESOUP Test Case Weakness Variants

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2015-10-27 14:35:32
22Web browsers / Pwn2Own / Hacking / Vulnerability / Safari / Heap spraying / Google Chrome / Exploit / Buffer overflow / Arbitrary code execution / Internet Explorer / Privilege escalation

$hell on Earth: From Browser to System Compromise Matt Molinyawe, Abdul-Aziz Hariri, and Jasiel Spelman A Zero Day Initiative Research Paper

Add to Reading List

Source URL: documents.trendmicro.com

Language: English - Date: 2016-08-03 12:08:47
23Cross-platform software / Object-oriented programming languages / Programming languages / Java platform / Pointer / Vulnerability / Java / Computer security / Software / Computer programming / Buffer overflow / Mobile security

Building Code for Medical Device Software Security Tom Haigh and Carl Landwehr READ ON!

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2015-07-23 13:16:04
24Software testing / Software bugs / Hacking / Buffer overflow / Computer memory / Vulnerability / Static single assignment form / Exploit / Patch / Test data generation / Concolic testing

Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications David Brumley, Pongsin Poosankam Dawn Song Jiang Zheng {dbrumley,ppoosank}@cs.cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
25Computability theory / Vulnerability / Public-key cryptography / Theoretical computer science / Models of computation / Buffer overflow / Social vulnerability / Zero-day / Ring signature / Symbolic execution / Turing machine / Halting problem

Towards Automatic Generation of Vulnerability-Based Signatures David Brumley, James Newsome, and Dawn Song Carnegie Mellon University Pittsburgh, PA, USA {dbrumley,jnewsome,dawnsong}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
26Software bugs / Buffer overflow protection / Buffer overflow / Return-to-libc attack / Stack / Subroutine / C standard library / Stack buffer overflow / Return-oriented programming

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
27Common Weakness Enumeration / Hacking / Software testing / Alloy / Buffer overflow / Actor model / Vulnerability / Software development / Modeling language / CWE

Lightweight Formal Models of Software Weaknesses Robin Gandhi, Harvey Siy, Yan Wu College of Information Science and Technology University of Nebraska at Omaha, USA {rgandhi, hsiy, ywu}@unomaha.edu definitions. Consider

Add to Reading List

Source URL: faculty.ist.unomaha.edu

Language: English - Date: 2013-05-29 09:13:46
28Central processing unit / Machine code / Software bugs / Return-oriented programming / Computer memory / Instruction set architectures / Buffer overflow protection / Self-modifying code / Subroutine / Stack / Return-to-libc attack / Instruction set

CFIMon: Detecting Violation of Control Flow Integrity using Performance Counters Yubin Xia† ‡, Yutao Liu† ‡, Haibo Chen†, Binyu Zang‡ †Institute of Parallel and Distributed Systems, Shanghai Jiao Tong Unive

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2012-08-23 22:16:01
29Computing / Software engineering / Software / Software bugs / Buffer overflow / Stack buffer overflow / Address space layout randomization / PaX / Uncontrolled format string / Pointer / Stack / Printf format string

String Oriented Programming Circumventing ASLR, DEP, and Other Guards Mathias Payer ETH Zurich, Switzerland

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
30Software engineering / Computing / Computer programming / Software bugs / Data types / Memory management / Primitive types / Programming language implementation / Pointer / Memory safety / Dangling pointer / Buffer overflow protection

Code-Pointer Integrity Volodymyr Kuznetsov∗ , L´aszl´o Szekeres‡ , Mathias Payer†,§ George Candea∗ , R. Sekar‡ , Dawn Song† ∗ Ecole ´ † UC

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
UPDATE