NX bit

Results: 20



#Item
1Computing / Software engineering / Computer programming / Software bugs / X86 architecture / Buffer overflow / Computer memory / X86-64 / Return-to-libc attack / X86 / Return-oriented programming / NX bit

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
2Software bugs / C Standard Library / Stack buffer overflow / Buffer overflow / Subroutines / Address space layout randomization / Return-to-libc attack / NX bit / Pointer / Computing / Software engineering / Computer programming

2013 IEEE Symposium on Security and Privacy Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

Add to Reading List

Source URL: wwwx.cs.unc.edu

Language: English - Date: 2014-09-05 15:38:44
3Software bugs / Central processing unit / NX bit / Buffer overflow / NX technology / Data Execution Prevention / Operating system / Black Hat Briefings / Code injection / Computer security / Software / Computing

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
4Software engineering / Stack buffer overflow / Buffer overflow / Address space layout randomization / PaX / Heap overflow / NX bit / Uncontrolled format string / Stack / Computing / Software bugs / Software quality

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:33
5PaX / NX bit / Address space layout randomization / Linux / Grsecurity / Debian / Return-to-libc attack / Kernel / Linux kernel / Software / System software / Computer architecture

PDF Document

Add to Reading List

Source URL: pax.grsecurity.net

Language: English - Date: 2012-06-03 20:41:41
6Central processing unit / Linux kernel / Linux / Monolithic kernels / PaX / NX bit / Kernel / Buffer overflow / X86-64 / Computer architecture / Software / System software

Introduction Kernel Toolchain

Add to Reading List

Source URL: pax.grsecurity.net

Language: English - Date: 2012-10-10 09:43:40
7Exec Shield / Linux / NX bit / Process / Address space layout randomization / PaX / Exec / X86 / Pointer / Computing / Computer architecture / System software

Exec-shield 환경 내의 exploit 작성 방법

Add to Reading List

Source URL: powerofcommunity.net

Language: English - Date: 2008-11-04 08:59:42
8C Standard Library / Return-to-libc attack / Address space layout randomization / Buffer overflow / GADGET / MOV / Shellcode / NX bit / Instruction selection / Computer architecture / Computing / Software bugs

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
9C Standard Library / Return-to-libc attack / Address space layout randomization / Buffer overflow / GADGET / MOV / Shellcode / NX bit / Instruction selection / Computer architecture / Computing / Software bugs

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2011-06-28 13:43:18
10EXE packers / UPX / NX bit / Portable Executable / EXE / C / X86 / Antivirus software / NX technology / Software / Computing / System software

Microsoft PowerPoint - Justin_raid.ppt [Compatibility Mode]

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 17:18:26
UPDATE