<--- Back to Details
First PageDocument Content
Software engineering / Stack buffer overflow / Buffer overflow / Address space layout randomization / PaX / Heap overflow / NX bit / Uncontrolled format string / Stack / Computing / Software bugs / Software quality
Date: 2015-05-28 15:51:33
Software engineering
Stack buffer overflow
Buffer overflow
Address space layout randomization
PaX
Heap overflow
NX bit
Uncontrolled format string
Stack
Computing
Software bugs
Software quality

Add to Reading List

Source URL: www.blackhat.com

Download Document from Source Website

File Size: 152,97 KB

Share Document on Facebook

Similar Documents

Computing / Software engineering / Computer programming / Software bugs / X86 architecture / Buffer overflow / Computer memory / X86-64 / Return-to-libc attack / X86 / Return-oriented programming / NX bit

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

DocID: 1qHLq - View Document

Software bugs / C Standard Library / Stack buffer overflow / Buffer overflow / Subroutines / Address space layout randomization / Return-to-libc attack / NX bit / Pointer / Computing / Software engineering / Computer programming

2013 IEEE Symposium on Security and Privacy Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

DocID: 1g6Zw - View Document

Software bugs / Central processing unit / NX bit / Buffer overflow / NX technology / Data Execution Prevention / Operating system / Black Hat Briefings / Code injection / Computer security / Software / Computing

PDF Document

DocID: 17g2g - View Document

Software engineering / Stack buffer overflow / Buffer overflow / Address space layout randomization / PaX / Heap overflow / NX bit / Uncontrolled format string / Stack / Computing / Software bugs / Software quality

PDF Document

DocID: 167ms - View Document

PaX / NX bit / Address space layout randomization / Linux / Grsecurity / Debian / Return-to-libc attack / Kernel / Linux kernel / Software / System software / Computer architecture

PDF Document

DocID: 14eyF - View Document