First Page | Document Content | |
---|---|---|
Date: 2013-03-11 01:57:58Computing Software bugs Software engineering Data types Computer memory Primitive types C standard library Memory safety Stack buffer overflow Pointer Dangling pointer Buffer overflow | SoK: Eternal War in Memory L´aszl´o Szekeres† , Mathias Payer‡ , Tao Wei∗‡ , Dawn Song‡ † Stony Brook University ‡ University of California, Berkeley ∗ Peking UniversityAdd to Reading ListSource URL: people.eecs.berkeley.eduDownload Document from Source WebsiteFile Size: 262,97 KBShare Document on Facebook |
¨ BOCHUM RUHR-UNIVERSITAT Horst G¨ortz Institute for IT Security Technical Report TR-HGIDocID: 1rePV - View Document | |
S AFE D ISPATCH: Securing C++ Virtual Calls from Memory Corruption Attacks Dongseok Jang Zachary TatlockDocID: 1pzmG - View Document | |
Hunting bugs with Coccinelle Department of Computer Science, University of Copenhagen Henrik Stuart 8th August 2008 AbstractDocID: 1prAh - View Document | |
Code-Pointer Integrity Volodymyr Kuznetsov∗ , L´aszl´o Szekeres‡ , Mathias Payer†,§ George Candea∗ , R. Sekar‡ , Dawn Song† ∗ Ecole ´ † UCDocID: 1o3Br - View Document | |
VTrust: Regaining Trust on Virtual Calls Chao Zhang Scott A. Carr Tongxin LiDocID: 1nYV6 - View Document |