<--- Back to Details
First PageDocument Content
Address space layout randomization / NOP / Computer architecture / Computing / Exploit / Shellcode / JIT spraying / Machine code
Date: 2013-11-14 10:23:32
Address space layout randomization
NOP
Computer architecture
Computing
Exploit
Shellcode
JIT spraying
Machine code

JIT-SPRAY Attacks & Advanced Shellcode HITBSecConf 2010, Amsterdam Alexey Sintsov

Add to Reading List

Source URL: www.dsecrg.com

Download Document from Source Website

File Size: 1,14 MB

Share Document on Facebook

Similar Documents

ASLR: How Robust is the Randomness? Jonathan Ganz What is Address Space Layout Randomization? ● Provides System-Level Control-Flow Integrity

DocID: 1uHp5 - View Document

Computing / Computer security / Software bugs / Address space layout randomization / Gadget / Buffer overflow / Return-to-libc attack / Shellcode / Instruction selection / Position-independent code / NOP / Return-oriented programming

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

DocID: 1rrtf - View Document

Computing / Software / Computer architecture / Android / Smartphones / Alphabet Inc. / ShmooCon / Dalvik / Address space layout randomization

TEAM JOCH vs. Android: The Ultimate Showdown TEAM JOCH vs. Android - ShmooCon 2011

DocID: 1rpSp - View Document

Software / Computing / Computer architecture / Computing platforms / Monolithic kernels / Kernel / Linux kernel / Address space layout randomization / Linux / Android / User space

Anatomy of a Remote Kernel Exploit Dan Rosenberg Copyright © 2011 Virtual Security Research, LLC.

DocID: 1qVjv - View Document

Software / System software / Computing / Message transfer agents / Internet Standards / IBM software / Postfix / Ntpd / Privilege separation / Sandbox / POSIX / Address space layout randomization

Privilege Separation and Pledge Main maid DNS maid - Theo de Raadt

DocID: 1qTW0 - View Document