<--- Back to Details
First PageDocument Content
Computing / Computer security / Software bugs / Address space layout randomization / Gadget / Buffer overflow / Return-to-libc attack / Shellcode / Instruction selection / Position-independent code / NOP / Return-oriented programming
Date: 2014-05-29 15:38:01
Computing
Computer security
Software bugs
Address space layout randomization
Gadget
Buffer overflow
Return-to-libc attack
Shellcode
Instruction selection
Position-independent code
NOP
Return-oriented programming

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Download Document from Source Website

File Size: 685,72 KB

Share Document on Facebook

Similar Documents

Compilation and Program Analysis (#6) : Intermediate Representations: CFG, DAGs (Instruction Selection and Scheduling), SSA Laure Gonnord http://laure.gonnord.org/pro/teaching/capM1.html

Compilation and Program Analysis (#6) : Intermediate Representations: CFG, DAGs (Instruction Selection and Scheduling), SSA Laure Gonnord http://laure.gonnord.org/pro/teaching/capM1.html

DocID: 1vrGr - View Document

Instruction Sheet for 4-H Members National 4-H Award Trip Application Process National 4-H trips are an exciting part of the 4-H experience. To apply for selection to attend a national 4-H award trip you are required to

Instruction Sheet for 4-H Members National 4-H Award Trip Application Process National 4-H trips are an exciting part of the 4-H experience. To apply for selection to attend a national 4-H award trip you are required to

DocID: 1v7YA - View Document

BURS-based Instruction Set Selection Dmitri Boulytchev St.Petersburg State University Universitetskii pr., 28 St.Petersburg, Russia

BURS-based Instruction Set Selection Dmitri Boulytchev St.Petersburg State University Universitetskii pr., 28 St.Petersburg, Russia

DocID: 1sUkE - View Document

Q: Exploit Hardening Made Easy  Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

DocID: 1rrtf - View Document

5e Rencontres Arithmétique de l’Informatique Mathématique (RAIMDijon, 20-22 juin 2012 Synthesis of fixed-point programs based on instruction selection ... the case of polynomial evaluation

5e Rencontres Arithmétique de l’Informatique Mathématique (RAIMDijon, 20-22 juin 2012 Synthesis of fixed-point programs based on instruction selection ... the case of polynomial evaluation

DocID: 1qv9U - View Document