Back to Results
First PageMeta Content
Object-oriented programming / Method / PHP / Prototype-based programming / JavaScript / Object / Serialization / Vulnerability / Inheritance / Software engineering / Computing / Computer programming


Code Reuse Attacks in PHP: Automated POP Chain Generation Johannes Dahse, Nikolai Krein, and Thorsten Holz Horst Görtz Institute for IT-Security (HGI) Ruhr-University Bochum, Germany
Add to Reading List

Document Date: 2014-09-10 11:24:27


Open Document

File Size: 431,15 KB

Share Result on Facebook

City

Scottsdale / /

Company

GLPI / Intel / /

Country

United States / /

Currency

PHP / CVE / USD / /

/

Facility

Thorsten Holz Horst Görtz Institute / University Bochum / /

IndustryTerm

cross-site / web applications / gadget chain / vulnerable applications / static analysis tool / reported software / real-world applications / Web Analytics / web servers / given web application / vulnerable software version / Web Security / gadget chains / /

Organization

Krein / and Thorsten Holz Horst Görtz Institute for IT-Security / US Federal Reserve / Thorsten Holz Horst Görtz Institute for IT-Security / /

Person

Solar Designer / Johannes Dahse / Thorsten Holz Horst / Nikolai Krein / /

/

Position

author / Private / Program analysis General / programmer / /

Product

Object Injection / SQL injection / /

ProgrammingLanguage

Ajax / SQL / PHP / DC / /

ProvinceOrState

Arizona / /

PublishedMedium

The POP / /

RadioStation

FD FC FM / /

Technology

object-oriented programming / XML / RAM / PHP / cloning / Ajax / simulation / /

URL

http /

SocialTag