Back to Results
First PageMeta Content
Software quality / Stack buffer overflow / Address space layout randomization / Buffer overflow protection / Return-to-libc attack / Buffer overflow / Stack / Shellcode / FALSE / Computing / Software bugs / Software engineering


Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of
Add to Reading List

Document Date: 2014-05-19 16:48:47


Open Document

File Size: 470,85 KB

Share Result on Facebook

City

READING / /

Company

ROP / MySQL / /

Event

M&A / /

IndustryTerm

contemporary operating systems / fragmentation router / security tool / vulnerable software versions / closed-binary services / toy proprietary server / 64bit systems / open-source server / vulnerable server / closed-source software / search space small / Open-source software / x86 systems / /

OperatingSystem

Mac OS X / Gentoo / Linux / Microsoft Windows / POSIX / /

Organization

Stanford University / /

Person

Ali Mashtizadeh / David Mazi`eres / Dan Boneh / Adam Belay / /

Position

driver / INF The driver / nginx driver / /

ProgrammingLanguage

RC / Ruby / C / /

Technology

generic IP fragmentation router / following algorithm / Linux / ASCII / HTTP / MTU / operating system / SSL / operating systems / /

SocialTag