Buffer overflow

Results: 538



#Item
41SoK: Eternal War in Memory L´aszl´o Szekeres† , Mathias Payer‡ , Tao Wei∗‡ , Dawn Song‡ † Stony Brook University ‡ University of California, Berkeley ∗ Peking University

SoK: Eternal War in Memory L´aszl´o Szekeres† , Mathias Payer‡ , Tao Wei∗‡ , Dawn Song‡ † Stony Brook University ‡ University of California, Berkeley ∗ Peking University

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
42Retrospective Protection utilizing Binary Rewriting Sergej Proskurin, Fatih Kilic, Claudia Eckert1 Abstract: Buffer overflow vulnerabilities present a common threat. To encounter this issue, operating system support and

Retrospective Protection utilizing Binary Rewriting Sergej Proskurin, Fatih Kilic, Claudia Eckert1 Abstract: Buffer overflow vulnerabilities present a common threat. To encounter this issue, operating system support and

Add to Reading List

Source URL: www.sec.in.tum.de

Language: English - Date: 2015-06-23 06:38:59
43The following paper was originally published in the Proceedings of the 7th USENIX Security Symposium San Antonio, Texas, January 26-29, 1998 StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Atta

The following paper was originally published in the Proceedings of the 7th USENIX Security Symposium San Antonio, Texas, January 26-29, 1998 StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Atta

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2002-04-30 18:05:07
    44Curriculum Vitae Name: Current: Studies:  Address:

    Curriculum Vitae Name: Current: Studies: Address:

    Add to Reading List

    Source URL: hmarco.org

    Language: English - Date: 2016-04-07 10:01:31
    45風水 Heap Feng Shui in JavaScript Alexander Sotirov   Introduction

    風水 Heap Feng Shui in JavaScript Alexander Sotirov Introduction

    Add to Reading List

    Source URL: www.trailofbits.com

    Language: English - Date: 2016-04-15 11:36:17
    46Memory Corruption Attacks The (almost) Complete History thinkst applied research haroon meer

    Memory Corruption Attacks The (almost) Complete History thinkst applied research haroon meer

    Add to Reading List

    Source URL: media.blackhat.com

    Language: English - Date: 2012-04-07 14:53:12
    47Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

    Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

    Add to Reading List

    Source URL: www.scs.stanford.edu

    Language: English - Date: 2016-01-02 20:09:14
    48SOFTWARE – PRACTICE AND EXPERIENCE Softw. Pract. ExperPublished online in Wiley Online Library (wileyonlinelibrary.com). DOI: spe.2180 Analysis of operating system diversity for intrusion tolerance Mig

    SOFTWARE – PRACTICE AND EXPERIENCE Softw. Pract. ExperPublished online in Wiley Online Library (wileyonlinelibrary.com). DOI: spe.2180 Analysis of operating system diversity for intrusion tolerance Mig

    Add to Reading List

    Source URL: www.di.fc.ul.pt

    Language: English - Date: 2013-01-18 09:24:08
    49Pwning (sometimes) with style Dragons’ notes on CTFs Mateusz

    Pwning (sometimes) with style Dragons’ notes on CTFs Mateusz "j00ru" Jurczyk, Gynvael Coldwind Insomni’hack 2015, Geneva

    Add to Reading List

    Source URL: j00ru.vexillium.org

    Language: English - Date: 2015-03-20 05:43:43
    50Portable Software Fault Isolation Joshua A. Kroll Computer Science Department Princeton University Princeton, NJ

    Portable Software Fault Isolation Joshua A. Kroll Computer Science Department Princeton University Princeton, NJ

    Add to Reading List

    Source URL: www.cs.princeton.edu

    Language: English - Date: 2014-05-10 07:53:45