<--- Back to Details
First PageDocument Content
Cyberwarfare / Buffer overflow protection / Stack buffer overflow / Buffer overflow / PaX / Address space layout randomization / Circular buffer / Pointer / Uncontrolled format string / Computing / Software bugs / Computer security
Date: 2013-03-01 01:14:43
Cyberwarfare
Buffer overflow protection
Stack buffer overflow
Buffer overflow
PaX
Address space layout randomization
Circular buffer
Pointer
Uncontrolled format string
Computing
Software bugs
Computer security

Breaking the memory secrecy assumption Raoul Strackx Yves Younan Pieter Philippaerts

Add to Reading List

Source URL: www.fort-knox.org

Download Document from Source Website

File Size: 166,99 KB

Share Document on Facebook

Similar Documents

Preventing memory error exploits with WIT Periklis Akritidis ∗ Cristian Cadar∗ Costin Raiciu∗ Manuel Costa

Preventing memory error exploits with WIT Periklis Akritidis ∗ Cristian Cadar∗ Costin Raiciu∗ Manuel Costa

DocID: 1q5Ky - View Document

Department of Electrical Engineering and Computer Science  MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

DocID: 1oK9c - View Document

CFIMon: Detecting Violation of Control Flow Integrity using Performance Counters Yubin Xia† ‡, Yutao Liu† ‡, Haibo Chen†, Binyu Zang‡ †Institute of Parallel and Distributed Systems, Shanghai Jiao Tong Unive

CFIMon: Detecting Violation of Control Flow Integrity using Performance Counters Yubin Xia† ‡, Yutao Liu† ‡, Haibo Chen†, Binyu Zang‡ †Institute of Parallel and Distributed Systems, Shanghai Jiao Tong Unive

DocID: 1odF8 - View Document

Code-Pointer Integrity Volodymyr Kuznetsov∗ , L´aszl´o Szekeres‡ , Mathias Payer†,§ George Candea∗ , R. Sekar‡ , Dawn Song† ∗ Ecole ´ † UC

Code-Pointer Integrity Volodymyr Kuznetsov∗ , L´aszl´o Szekeres‡ , Mathias Payer†,§ George Candea∗ , R. Sekar‡ , Dawn Song† ∗ Ecole ´ † UC

DocID: 1o3Br - View Document

Retrospective Protection utilizing Binary Rewriting Sergej Proskurin, Fatih Kilic, Claudia Eckert1 Abstract: Buffer overflow vulnerabilities present a common threat. To encounter this issue, operating system support and

Retrospective Protection utilizing Binary Rewriting Sergej Proskurin, Fatih Kilic, Claudia Eckert1 Abstract: Buffer overflow vulnerabilities present a common threat. To encounter this issue, operating system support and

DocID: 1mDhJ - View Document