Back to Results
First PageMeta Content
Buffer overflow / Stack / Shellcode / Software engineering / Software quality / Assembly languages / Software bugs / Computing / X86


A stack model for symbolic buffer overflow exploitability analysis Extended Abstract Gustavo Grieco University of Grenoble VERIMAG
Add to Reading List

Document Date: 2013-03-12 10:48:31


Open Document

File Size: 175,11 KB

Share Result on Facebook

City

Washington DC / /

Company

GPU / IEEE Press / S&P / /

Country

France / United States / /

/

Facility

Marie-Laure Potet University of Grenoble VERIMAG Grenoble / Sanjay Rawat∗ University of Grenoble LIG Grenoble / Laurent Mounier University of Grenoble VERIMAG Grenoble / Extended Abstract Gustavo Grieco University of Grenoble VERIMAG Grenoble / /

IndustryTerm

software vulnerabilities / inside software / /

Organization

University of Grenoble LIG Grenoble / Extended Abstract Gustavo Grieco University of Grenoble VERIMAG Grenoble / University of Grenoble VERIMAG Grenoble / /

Person

S. Engle / D. Howard / S. Whalen / M. Bishop / Sanjay Rawat / /

Position

XPLOITABILITY FORMULA GENERATION A. General Approach We present Symbolic Exploit Assistant / stack model for symbolic buffer overflow exploitability analysis / Bishop / /

ProgrammingLanguage

Python / /

SocialTag