Overflow

Results: 1424



#Item
101Pwning (sometimes) with style Dragons’ notes on CTFs Mateusz

Pwning (sometimes) with style Dragons’ notes on CTFs Mateusz "j00ru" Jurczyk, Gynvael Coldwind Insomni’hack 2015, Geneva

Add to Reading List

Source URL: j00ru.vexillium.org

Language: English - Date: 2015-03-20 05:43:43
102Portable Software Fault Isolation Joshua A. Kroll Computer Science Department Princeton University Princeton, NJ

Portable Software Fault Isolation Joshua A. Kroll Computer Science Department Princeton University Princeton, NJ

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2014-05-10 07:53:45
103Transformation-aware Exploit Generation using a HICFG  Dan Caselden Alex Bazhanyuk Mathias Payer Laszlo Szekeres

Transformation-aware Exploit Generation using a HICFG Dan Caselden Alex Bazhanyuk Mathias Payer Laszlo Szekeres

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2013-05-16 23:27:09
104OVERFLOW BUS PARKING HERE  A12 A11

OVERFLOW BUS PARKING HERE A12 A11

Add to Reading List

Source URL: www.farmersmarketla.com

Language: English - Date: 2015-08-10 21:44:57
    1053.3.5 Exception: DataInvalid This exception is thrown when data passed to a method is invalid, for example in case of a data field overflow (name is too long). final public class DataInvalid extends org.omg.CORBA.UserExc

    3.3.5 Exception: DataInvalid This exception is thrown when data passed to a method is invalid, for example in case of a data field overflow (name is too long). final public class DataInvalid extends org.omg.CORBA.UserExc

    Add to Reading List

    Source URL: sabi.net

    Language: English - Date: 2001-07-06 21:10:12
      106.oO Phrack 49 Oo. Volume Seven, Issue Forty­Nine File 14 of 16 BugTraq, r00t, and Underground.Org  bring you  Smashing The Stack For Fun And Profit

      .oO Phrack 49 Oo. Volume Seven, Issue Forty­Nine File 14 of 16 BugTraq, r00t, and Underground.Org  bring you Smashing The Stack For Fun And Profit

      Add to Reading List

      Source URL: inst.eecs.berkeley.edu

      Language: English - Date: 2008-08-26 17:57:09
      107Relative Vulnerability: An Empirical Assurance Metric Crispin Cowan, PhD CTO, Immunix

      Relative Vulnerability: An Empirical Assurance Metric Crispin Cowan, PhD CTO, Immunix

      Add to Reading List

      Source URL: adam.shostack.org

      Language: English - Date: 2014-06-11 11:49:30
      108Self-Healing Multitier Architectures Using Cascading Rescue Points Angeliki Zavou, Georgios Portokalidis, Angelos D. Keromytis Department of Computer Science Columbia University, New York, NY, USA {azavou, porto, angelos

      Self-Healing Multitier Architectures Using Cascading Rescue Points Angeliki Zavou, Georgios Portokalidis, Angelos D. Keromytis Department of Computer Science Columbia University, New York, NY, USA {azavou, porto, angelos

      Add to Reading List

      Source URL: www.cs.columbia.edu

      Language: English - Date: 2013-01-22 23:52:05
      109Microsoft PowerPoint - lec9-buffer-overflow

      Microsoft PowerPoint - lec9-buffer-overflow

      Add to Reading List

      Source URL: inst.eecs.berkeley.edu

      Language: English - Date: 2008-09-29 13:52:45
        110Framing Signals—A Return to Portable Shellcode Erik Bosman Vrije Universiteit Amsterdam

        Framing Signals—A Return to Portable Shellcode Erik Bosman Vrije Universiteit Amsterdam

        Add to Reading List

        Source URL: www.cs.vu.nl

        Language: English - Date: 2014-03-24 10:31:12