Memory corruption

Results: 51



#Item
1Software engineering / Computer programming / Computing / Method / Object-oriented programming / Data types / High-level programming languages / Dynamic dispatch / Polymorphism / Virtual method table / Method overriding / Objective-C

S AFE D ISPATCH: Securing C++ Virtual Calls from Memory Corruption Attacks Dongseok Jang Zachary Tatlock

Add to Reading List

Source URL: homes.cs.washington.edu

Language: English - Date: 2018-10-18 11:22:47
2Computer memory / Computing / Computer hardware / Non-volatile memory / System software / Boot loaders / Computer architecture / BIOS / Read-only memory / Flash memory / Random-access memory / Booting

Service BulletinStacker - Quipp 40X and 50X Series No Boot Up Device - Message PROBLEM: No boot up device message. 500 Series Stacker On a 500 series stacker this message typically occurs because of corruption in

Add to Reading List

Source URL: www.quipp.com

Language: English - Date: 2016-01-11 15:34:31
3Method / Object-oriented programming / Data types / Cross-platform software / Virtual method table / Dynamic dispatch / Polymorphism / Method overriding / Objective-C / Dangling pointer / Control flow / Pointer

S AFE D ISPATCH: Securing C++ Virtual Calls from Memory Corruption Attacks Dongseok Jang Zachary Tatlock

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2013-12-28 00:32:24
4Software engineering / Computing / Computer programming / Software bugs / Data types / Primitive types / Memory management / Pointer / Swift / Memory corruption / Reference / C dynamic memory allocation

Code-Pointer Integrity Volodmyr Kuzentsov, László Szekeres, Mathias Payer, George Candea, R. Sekar, and Dawn Song (c) TriStar Pictures, Inc. & Touchstone Pictures, 1997

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
5Computing / Computer data storage / Computer storage media / Information science / Computer storage devices / Hard disk drive / Non-volatile memory / Disk sector / Data corruption / RAID / Error detection and correction / Disk storage

An Analysis of Latent Sector Errors in Disk Drives Lakshmi N. Bairavasundaram† , Garth R. Goodson, Shankar Pasupathy, Jiri Schindler † † University of Wisconsin-Madison, Network Appliance, Inc.

Add to Reading List

Source URL: research.cs.wisc.edu

Language: English - Date: 2007-07-11 01:51:56
6Software bugs / Data types / Pointer / Return-oriented programming / Memory corruption / D

… in memory: an evolution of attacks Mathias Payer <> UC Berkeley Images (c) MGM, WarGames, 1983

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
7Software bugs / Buffer overflow / Open Source Vulnerability Database / Computer security / Computer memory / Morris worm / Memory corruption / Vulnerability / Computer worm / Blackhat

Memory Corruption Attacks The (almost) Complete History thinkst applied research haroon meer

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:53:12
8Computing / Software / System software / Memory management / Virtual memory / Disk file systems / Computer errors / Computer storage devices / Paging / Error message / C dynamic memory allocation / Data corruption

Dependability Analysis of Virtual Memory Systems Lakshmi N. Bairavasundaram Andrea C. Arpaci-Dusseau Remzi H. Arpaci-Dusseau Computer Sciences Department University of Wisconsin, Madison

Add to Reading List

Source URL: research.cs.wisc.edu

Language: English - Date: 2006-05-26 20:19:40
9Computer security / Address space layout randomization / Malware / Cyberwarfare

Attacker “Math” 101 Professor Dai Zovi Institute for the Advancement of Memory Corruption What is this all

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:17
10

Exploitation of Via Memory corruption Private & Confidential Property of COSEINC

Add to Reading List

Source URL: archive.hack.lu

Language: English - Date: 2012-10-23 09:27:27
    UPDATE