<--- Back to Details
First PageDocument Content
Computing / Computer security / Software bugs / Address space layout randomization / Gadget / Buffer overflow / Return-to-libc attack / Shellcode / Instruction selection / Position-independent code / NOP / Return-oriented programming
Date: 2014-05-29 15:38:01
Computing
Computer security
Software bugs
Address space layout randomization
Gadget
Buffer overflow
Return-to-libc attack
Shellcode
Instruction selection
Position-independent code
NOP
Return-oriented programming

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Download Document from Source Website

File Size: 685,72 KB

Share Document on Facebook

Similar Documents

Q: Exploit Hardening Made Easy  Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

DocID: 1rrtf - View Document

Cheating the ELF Subversive Dynamic Linking to Libraries the grugq Abstract: Development of feature rich Unix parasites has been severely limited by the inability to reliably access functions external to the host file. U

Cheating the ELF Subversive Dynamic Linking to Libraries the grugq Abstract: Development of feature rich Unix parasites has been severely limited by the inability to reliably access functions external to the host file. U

DocID: 1pleQ - View Document

Safe Loading - A Foundation for Secure Execution of Untrusted Programs Mathias Payer ETH Zurich, Switzerland Tobias Hartmann ETH Zurich, Switzerland

Safe Loading - A Foundation for Secure Execution of Untrusted Programs Mathias Payer ETH Zurich, Switzerland Tobias Hartmann ETH Zurich, Switzerland

DocID: 1nOwm - View Document

CAIN: Silently Breaking ASLR in the Cloud Antonio Barresi ETH Zurich Kaveh Razavi VU University Amsterdam

CAIN: Silently Breaking ASLR in the Cloud Antonio Barresi ETH Zurich Kaveh Razavi VU University Amsterdam

DocID: 1nIKm - View Document

Too much PIE is bad for performance Mathias  Department of Computer Science, ETH Zurich Abstract Compiling an application as a Position Independent Executable (PIE) enables Address Space L

Too much PIE is bad for performance Mathias Department of Computer Science, ETH Zurich Abstract Compiling an application as a Position Independent Executable (PIE) enables Address Space L

DocID: 1n5Xl - View Document