<--- Back to Details
First PageDocument Content
Computer security / Computing / Cyberwarfare / Software bugs / Computer errors / Shellcode / Buffer overflow / Return-oriented programming / Heap overflow / Address space layout randomization / Symbolic execution / Exploit
Date: 2014-05-29 15:38:01
Computer security
Computing
Cyberwarfare
Software bugs
Computer errors
Shellcode
Buffer overflow
Return-oriented programming
Heap overflow
Address space layout randomization
Symbolic execution
Exploit

doi:The idea is to identify security-critical software bugs so they can be fixed first. By Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumle

Add to Reading List

Source URL: users.ece.cmu.edu

Download Document from Source Website

File Size: 4,15 MB

Share Document on Facebook

Similar Documents

Heap and BSS Overflow Ⅱ Arbro on-02-19

Heap and BSS Overflow Ⅱ Arbro on-02-19

DocID: 1uD4u - View Document

doi:The idea is to identify security-critical software bugs so they can be fixed first. By Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumle

doi:The idea is to identify security-critical software bugs so they can be fixed first. By Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumle

DocID: 1qEiC - View Document

Data Randomization Cristian Cadar Microsoft Research Cambridge, UK

Data Randomization Cristian Cadar Microsoft Research Cambridge, UK

DocID: 1qxLg - View Document

b  The heap sucks The Stack is Back – Jon Oberheide

b The heap sucks The Stack is Back – Jon Oberheide

DocID: 1pRdF - View Document

$hell on Earth: From Browser to System Compromise Matt Molinyawe, Abdul-Aziz Hariri, and Jasiel Spelman A Zero Day Initiative Research Paper

$hell on Earth: From Browser to System Compromise Matt Molinyawe, Abdul-Aziz Hariri, and Jasiel Spelman A Zero Day Initiative Research Paper

DocID: 1p8BX - View Document