Software bugs

Results: 1223



#Item
91Memory Corruption Attacks The (almost) Complete History thinkst applied research haroon meer

Memory Corruption Attacks The (almost) Complete History thinkst applied research haroon meer

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:53:12
92Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2016-01-02 20:09:14
93Finding Error Handling Bugs in OpenSSL using Coccinelle Julia Lawall∗ , Ben Laurie† , Ren´e Rydhof Hansen‡ , Nicolas Palix∗ and Gilles Muller§ ∗ University of Copenhagen, Email: {julia,npalix}@diku.dk † Goo

Finding Error Handling Bugs in OpenSSL using Coccinelle Julia Lawall∗ , Ben Laurie† , Ren´e Rydhof Hansen‡ , Nicolas Palix∗ and Gilles Muller§ ∗ University of Copenhagen, Email: {julia,npalix}@diku.dk † Goo

Add to Reading List

Source URL: coccinelle.lip6.fr

Language: English - Date: 2012-01-04 11:08:48
94Pwning (sometimes) with style Dragons’ notes on CTFs Mateusz

Pwning (sometimes) with style Dragons’ notes on CTFs Mateusz "j00ru" Jurczyk, Gynvael Coldwind Insomni’hack 2015, Geneva

Add to Reading List

Source URL: j00ru.vexillium.org

Language: English - Date: 2015-03-20 05:43:43
95Portable Software Fault Isolation Joshua A. Kroll Computer Science Department Princeton University Princeton, NJ

Portable Software Fault Isolation Joshua A. Kroll Computer Science Department Princeton University Princeton, NJ

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2014-05-10 07:53:45
96Transformation-aware Exploit Generation using a HICFG  Dan Caselden Alex Bazhanyuk Mathias Payer Laszlo Szekeres

Transformation-aware Exploit Generation using a HICFG Dan Caselden Alex Bazhanyuk Mathias Payer Laszlo Szekeres

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2013-05-16 23:27:09
97Website Security Statistics Report  2015 About This Report WhiteHat Security’s Website Security Statistics

Website Security Statistics Report 2015 About This Report WhiteHat Security’s Website Security Statistics

Add to Reading List

Source URL: info.whitehatsec.com

Language: English - Date: 2016-02-25 05:35:53
98Implementing a Verified On-Disk Hash Table Stephanie Wang Abstract As more and more software is written every day, so too are bugs. Software verification is a way of using formal

Implementing a Verified On-Disk Hash Table Stephanie Wang Abstract As more and more software is written every day, so too are bugs. Software verification is a way of using formal

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2015-06-14 19:45:36
    99.oO Phrack 49 Oo. Volume Seven, Issue Forty­Nine File 14 of 16 BugTraq, r00t, and Underground.Org  bring you  Smashing The Stack For Fun And Profit

    .oO Phrack 49 Oo. Volume Seven, Issue Forty­Nine File 14 of 16 BugTraq, r00t, and Underground.Org  bring you Smashing The Stack For Fun And Profit

    Add to Reading List

    Source URL: inst.eecs.berkeley.edu

    Language: English - Date: 2008-08-26 17:57:09
    100Relative Vulnerability: An Empirical Assurance Metric Crispin Cowan, PhD CTO, Immunix

    Relative Vulnerability: An Empirical Assurance Metric Crispin Cowan, PhD CTO, Immunix

    Add to Reading List

    Source URL: adam.shostack.org

    Language: English - Date: 2014-06-11 11:49:30