Overflow

Results: 1424



#Item
71String Oriented Programming: When ASLR is not Enough Mathias Payer Thomas R. Gross  Department of Computer Science

String Oriented Programming: When ASLR is not Enough Mathias Payer Thomas R. Gross Department of Computer Science

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
72Hot subdwarfs from the stable Roche lobe overflow channel

Hot subdwarfs from the stable Roche lobe overflow channel

Add to Reading List

Source URL: www.arm.ac.uk

Language: English - Date: 2009-08-24 05:22:41
    73Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

    Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

    Add to Reading List

    Source URL: css.csail.mit.edu

    Language: English - Date: 2016-01-29 11:50:05
      74String Oriented Programming  Circumventing ASLR, DEP, and other Guards Mathias Payer, ETH Zürich

      String Oriented Programming Circumventing ASLR, DEP, and other Guards Mathias Payer, ETH Zürich

      Add to Reading List

      Source URL: hexhive.github.io

      Language: English - Date: 2016-06-13 11:08:40
      75Appeared in Proceedings of the 34th International Conference on Software Engineering (ICSE), Zurich, Switzerland, JuneUnderstanding Integer Overflow in C/C++ Will Dietz,∗ Peng Li,† John Regehr,† and Vikram

      Appeared in Proceedings of the 34th International Conference on Software Engineering (ICSE), Zurich, Switzerland, JuneUnderstanding Integer Overflow in C/C++ Will Dietz,∗ Peng Li,† John Regehr,† and Vikram

      Add to Reading List

      Source URL: www.cs.utah.edu

      Language: English - Date: 2012-03-30 12:02:04
      76Control-Flow Bending: On the Effectiveness of Control-Flow Integrity Nicolas Carlini UC Berkeley  Antonio Barresi

      Control-Flow Bending: On the Effectiveness of Control-Flow Integrity Nicolas Carlini UC Berkeley Antonio Barresi

      Add to Reading List

      Source URL: hexhive.github.io

      Language: English - Date: 2016-06-13 11:08:40
      77IEEE  SECURITY& PRIVACY Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page

      IEEE SECURITY& PRIVACY Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page

      Add to Reading List

      Source URL: hexhive.github.io

      Language: English - Date: 2016-06-13 11:08:40
      78Augmenting API Documentation with Insights from Stack Overflow Christoph Treude Martin P. Robillard

      Augmenting API Documentation with Insights from Stack Overflow Christoph Treude Martin P. Robillard

      Add to Reading List

      Source URL: ctreude.files.wordpress.com

      Language: English - Date: 2016-01-29 03:44:18
        79Transformation-aware Exploit Generation using a HICFG  Dan Caselden Alex Bazhanyuk Mathias Payer Laszlo Szekeres

        Transformation-aware Exploit Generation using a HICFG Dan Caselden Alex Bazhanyuk Mathias Payer Laszlo Szekeres

        Add to Reading List

        Source URL: hexhive.github.io

        Language: English - Date: 2016-06-13 11:08:40
        80Too much PIE is bad for performance Mathias  Department of Computer Science, ETH Zurich Abstract Compiling an application as a Position Independent Executable (PIE) enables Address Space L

        Too much PIE is bad for performance Mathias Department of Computer Science, ETH Zurich Abstract Compiling an application as a Position Independent Executable (PIE) enables Address Space L

        Add to Reading List

        Source URL: hexhive.github.io

        Language: English - Date: 2016-06-13 11:08:40