<--- Back to Details
First PageDocument Content
Computer security / Cyberwarfare / Cybercrime / Address space layout randomization / Return-oriented programming / Vulnerability / Code injection / Software bugs / JIT spraying / PaX
Date: 2016-06-13 11:08:40
Computer security
Cyberwarfare
Cybercrime
Address space layout randomization
Return-oriented programming
Vulnerability
Code injection
Software bugs
JIT spraying
PaX

String Oriented Programming: When ASLR is not enough Mathias Payer* and Thomas R. Gross Department of Computer Science ETH Zürich, Switzerland

Add to Reading List

Source URL: hexhive.github.io

Download Document from Source Website

File Size: 719,44 KB

Share Document on Facebook

Similar Documents

Jens Knoop, Uwe Zdun (Hrsg.): Software Engineering 2016, Lecture Notes in Informatics (LNI), Gesellschaft f¨ur Informatik, BonnLearning how to prevent return-oriented programming efficiently David Pfaff 1 Sebas

Jens Knoop, Uwe Zdun (Hrsg.): Software Engineering 2016, Lecture Notes in Informatics (LNI), Gesellschaft f¨ur Informatik, BonnLearning how to prevent return-oriented programming efficiently David Pfaff 1 Sebas

DocID: 1uSQW - View Document

Q: Exploit Hardening Made Easy  Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

DocID: 1rrtf - View Document

PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution Andreas Follner1 , Alexandre Bartel1 , Hui Peng2 , Yu-Chen Chang2 , Kyriakos Ispoglou2 , Mathias Payer2 , and Eric Bodden3 1

PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution Andreas Follner1 , Alexandre Bartel1 , Hui Peng2 , Yu-Chen Chang2 , Kyriakos Ispoglou2 , Mathias Payer2 , and Eric Bodden3 1

DocID: 1rlhb - View Document

Department of Electrical Engineering and Computer Science  MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

DocID: 1qHLq - View Document

doi:The idea is to identify security-critical software bugs so they can be fixed first. By Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumle

doi:The idea is to identify security-critical software bugs so they can be fixed first. By Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumle

DocID: 1qEiC - View Document