Memory corruption

Results: 51



#Item
21Argos:  The High-Interaction back-end Honeypot of NoAH

Argos: The High-Interaction back-end Honeypot of NoAH

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2008-05-24 13:54:57
22Data Loss Warning Form  The following information applies to your business, You should be aware that some processes carried out during the repair of any computer device may result in the corruption, partial or total loss

Data Loss Warning Form The following information applies to your business, You should be aware that some processes carried out during the repair of any computer device may result in the corruption, partial or total loss

Add to Reading List

Source URL: www.asi.com.au

Language: English - Date: 2013-10-01 01:08:59
23Helping you avoid stack overflow crashes!  One of the toughest (and unfortunately common) problems in embedded systems is stack overflows and the collateral corruption that it can cause. As a result, we have spent consid

Helping you avoid stack overflow crashes! One of the toughest (and unfortunately common) problems in embedded systems is stack overflows and the collateral corruption that it can cause. As a result, we have spent consid

Add to Reading List

Source URL: rtos.com

Language: English - Date: 2010-11-12 18:36:33
24SoK: Eternal War in Memory L´aszl´o Szekeres† , Mathias Payer‡ , Tao Wei∗‡ , Dawn Song‡ † Stony Brook University ‡ University of California, Berkeley ∗ Peking University

SoK: Eternal War in Memory L´aszl´o Szekeres† , Mathias Payer‡ , Tao Wei∗‡ , Dawn Song‡ † Stony Brook University ‡ University of California, Berkeley ∗ Peking University

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:27
25Attacking WebKit Applications by exploiting memory corruption bugs Liang Chen @KeenTeam @chenliang0817  About me

Attacking WebKit Applications by exploiting memory corruption bugs Liang Chen @KeenTeam @chenliang0817 About me

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2015-04-02 00:45:05
26DRAM Errors in the Wild: A Large-Scale Field Study Bianca Schroeder Eduardo Pinheiro  Wolf-Dietrich Weber

DRAM Errors in the Wild: A Large-Scale Field Study Bianca Schroeder Eduardo Pinheiro Wolf-Dietrich Weber

Add to Reading List

Source URL: static.googleusercontent.com

Language: English - Date: 2012-04-01 20:13:23
27Chapter 1  Chapter 1 Introduction Even though memory corruption vulnerabilities are inherent to C, this language is

Chapter 1 Chapter 1 Introduction Even though memory corruption vulnerabilities are inherent to C, this language is

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2013-04-18 05:57:24
28Attacking the Vista Heap Ben Hawkes v4  The Heap

Attacking the Vista Heap Ben Hawkes v4 The Heap

Add to Reading List

Source URL: www.lateralsecurity.com

Language: English - Date: 2015-03-04 17:36:24
29Secure 64 SourceT OS Security Evaluation Report Matasano Security, LLC November 20, 2007

Secure 64 SourceT OS Security Evaluation Report Matasano Security, LLC November 20, 2007

Add to Reading List

Source URL: www.secure64.com

Language: English - Date: 2009-10-09 13:10:06
30Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis Mingwei Zhang1 , Aravind Prakash2 , Xiaolei Li1 , Zhenkai Liang1 , and Heng Yin2 1 School of Computing, National University

Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis Mingwei Zhang1 , Aravind Prakash2 , Xiaolei Li1 , Zhenkai Liang1 , and Heng Yin2 1 School of Computing, National University

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2012-03-21 11:17:55