![Computing / Computer security / Software bugs / Address space layout randomization / Gadget / Buffer overflow / Return-to-libc attack / Shellcode / Instruction selection / Position-independent code / NOP / Return-oriented programming Computing / Computer security / Software bugs / Address space layout randomization / Gadget / Buffer overflow / Return-to-libc attack / Shellcode / Instruction selection / Position-independent code / NOP / Return-oriented programming](https://www.pdfsearch.io/img/7440caca5b4718e21dc87679ce1a91b3.jpg) Date: 2014-05-29 15:38:01Computing Computer security Software bugs Address space layout randomization Gadget Buffer overflow Return-to-libc attack Shellcode Instruction selection Position-independent code NOP Return-oriented programming | | Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.eduAdd to Reading ListSource URL: users.ece.cmu.eduDownload Document from Source Website File Size: 685,72 KBShare Document on Facebook
|