Shellcode

Results: 175



#Item
141X86 architecture / MOV / Accumulator / Pointer / Brainfuck / .dwg / Shellcode / High Level Assembly / CPUID / Computing / Computer architecture / X86 instructions

security research Autodesk AutoCAD DWG-AC1021 Heap Corruption

Add to Reading List

Source URL: www.binamuse.com

Language: English
142Computer programming / Buffer overflow / Pointer / Address space layout randomization / Stack / Shellcode / C / Uncontrolled format string / Memory corruption / Computing / Software bugs / Software engineering

0 CPM: Masking Code Pointers to Prevent Code Injection Attacks PIETER PHILIPPAERTS, YVES YOUNAN, STIJN MUYLLE and FRANK PIESSENS, DistriNet Research Group, University of Leuven SVEN LACHMUND and THOMAS WALTER, DOCOMO Eu

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-11-05 16:02:36
143Addressing mode / Shellcode / Instruction set / ARM architecture / Processor register / MOV / DEC Alpha / X86 / Machine code / Computer architecture / Computing / Instruction set architectures

J Comput Virol DOI[removed]s11416[removed]ORIGINAL PAPER Filter-resistant code injection on ARM

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-02-27 15:05:50
144Software bugs / Stack buffer overflow / Buffer overflow / Pointer / Function prologue / Shellcode / Stack / C / Address space layout randomization / Computing / Software engineering / Computer programming

Code Pointer Masking: Hardening Applications against Code Injection Attacks Pieter Philippaerts1 , Yves Younan1 , Stijn Muylle1 , Frank Piessens1 , Sven Lachmund2 , and Thomas Walter2 1

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-02-27 15:06:43
145Software bugs / Heap spraying / Buffer overflow / Shellcode / Address space layout randomization / NOP slide / Cross-site request forgery / NOP / JavaScript / Cyberwarfare / Computing / Computer security

BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks Francesco Gadaleta, Yves Younan, and Wouter Joosen IBBT-Distrinet, Katholieke Universiteit Leuven, 3001, Leuven Belgium Abstract. Web brows

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-02-27 15:06:55
146Central processing unit / Assembly languages / Software bugs / Shellcode / Addressing mode / ARM architecture / Instruction set / Processor register / MOV / Computer architecture / Computing / Instruction set architectures

Filter-resistant Code Injection on ARM Yves Younan Pieter Philippaerts Frank Piessens

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-03-01 01:15:37
147Cyberwarfare / Buffer overflow protection / Buffer overflow / Vulnerability / PaX / Uncontrolled format string / Stack / C dynamic memory allocation / Shellcode / Software bugs / Computer security / Computing

PDF Document

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-02-25 04:08:30
148ITunes / IPhone / Software / Address space layout randomization / IOS jailbreaking / Return-to-libc attack / IPad / Pwn2Own / Shellcode / Apple Inc. / Computing / IOS

http://www.sektioneins.de Adding ASLR to jailbroken iPhones Stefan Esser What the talk is NOT about

Add to Reading List

Source URL: antid0te.com

Language: English - Date: 2014-02-28 09:59:45
149Software quality / Stack buffer overflow / Shellcode / Vulnerability / Stack / X86 instruction listings / Pointer / X86 / Exploit / Computing / Software bugs / Cyberwarfare

University of Oxford Computing Laboratory MSc Computer Science Dissertation Automatic Generation of Control Flow Hijacking Exploits for Software Vulnerabilities

Add to Reading List

Source URL: www.cprover.org

Language: English - Date: 2009-10-05 15:17:48
150Computer security / Embedded operating systems / Heap overflow / Buffer overflow / Computer network security / Cisco IOS / Router / Shellcode / Cisco Systems / Computing / Cyberwarfare / Software bugs

The Holy Grail: Cisco IOS Shellcode And Exploitation Techniques Michael Lynn Internet Security Systems

Add to Reading List

Source URL: bernd-paysan.de

Language: English - Date: 2005-07-30 09:17:01
UPDATE