<--- Back to Details
First PageDocument Content
C Standard Library / Return-to-libc attack / Address space layout randomization / Buffer overflow / Software engineering / GADGET / MOV / Shellcode / NX bit / Computing / Software bugs / Computer architecture
Date: 2014-12-17 15:18:11
C Standard Library
Return-to-libc attack
Address space layout randomization
Buffer overflow
Software engineering
GADGET
MOV
Shellcode
NX bit
Computing
Software bugs
Computer architecture

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Download Document from Source Website

File Size: 708,78 KB

Share Document on Facebook

Similar Documents

Department of Electrical Engineering and Computer Science  MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

DocID: 1qHLq - View Document

2013 IEEE Symposium on Security and Privacy  Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

2013 IEEE Symposium on Security and Privacy Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

DocID: 1g6Zw - View Document

PDF Document

DocID: 17g2g - View Document

PDF Document

DocID: 167ms - View Document

PDF Document

DocID: 14eyF - View Document