Back to Results
First PageMeta Content
Address space layout randomization / Computer file formats / Programming language implementation / Mac OS X / PaX / Return-to-libc attack / Relocation / JIT spraying / Prelink / Software / Computing / System software


Address Space Randomization for Mobile Devices Hristo Bojinov Dan Boneh Rich Cannings
Add to Reading List

Document Date: 2011-03-01 17:48:00


Open Document

File Size: 282,01 KB

Share Result on Facebook

City

Hamburg / Mountain View / /

Company

HTC / Microsoft / Google Inc. / USA Google Inc. / /

Country

Germany / United States / /

Currency

USD / /

/

IndustryTerm

user devices / server operating systems / target devices / crash analysis algorithm / open-source operating systems / time and during software / system_server / software build / software updates / mobile operating systems / microcontroller-based devices / malicious applications / target device / native applications / apriori tool / software update / detection algorithm / vulnerable network-facing services / retouch-bindiff tool / binary editing tools / media service / telephony service / randomized devices / /

OperatingSystem

Windows Vista / Mac OS X / Linux / Android / Windows XP / Microsoft Windows / Leopard / /

Organization

Stanford University Stanford / /

Person

Dan Boneh Rich Cannings / /

/

Position

Protection General / intended threat model for ASLR / Major / Representative / /

Product

HTC Magic Smartphone / /

ProgrammingLanguage

Java / /

Technology

virtual machine / SMS / Linux / smartphone / Android / operating system / operating systems / Mobile Devices / cmp / Java / ascii / smartphones / crash analysis algorithm / caching / flash / detection algorithm / /

SocialTag