<--- Back to Details
First PageDocument Content
Computing / Computer security / Software bugs / Address space layout randomization / Gadget / Buffer overflow / Return-to-libc attack / Shellcode / Instruction selection / Position-independent code / NOP / Return-oriented programming
Date: 2014-05-29 15:38:01
Computing
Computer security
Software bugs
Address space layout randomization
Gadget
Buffer overflow
Return-to-libc attack
Shellcode
Instruction selection
Position-independent code
NOP
Return-oriented programming

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Download Document from Source Website

File Size: 685,72 KB

Share Document on Facebook

Similar Documents

Network-Level Polymorphic Shellcode Detection Using Emulation Michalis Polychronakis1 , Kostas G. Anagnostakis2 , and Evangelos P. Markatos1 1  Institute of Computer Science, Foundation for Research & Technology – Hell

Network-Level Polymorphic Shellcode Detection Using Emulation Michalis Polychronakis1 , Kostas G. Anagnostakis2 , and Evangelos P. Markatos1 1 Institute of Computer Science, Foundation for Research & Technology – Hell

DocID: 1tgZi - View Document

ShellNoob Because writing shellcode is fun, but sometimes painful Black Hat USA Arsenal 2013

ShellNoob Because writing shellcode is fun, but sometimes painful Black Hat USA Arsenal 2013

DocID: 1tfIa - View Document

http://www.nologin.org  Understanding Windows Shellcode skape

http://www.nologin.org Understanding Windows Shellcode skape

DocID: 1temb - View Document

Look Mom, I don’t use Shellcode Browser Exploitation Case Study for Internet Explorer 11 Moritz Jodeit (@moritzj)  Agenda

Look Mom, I don’t use Shellcode Browser Exploitation Case Study for Internet Explorer 11 Moritz Jodeit (@moritzj) Agenda

DocID: 1sSdc - View Document