<--- Back to Details
First PageDocument Content
Software bugs / Data types / Primitive types / Assembly languages / Instruction set architectures / Buffer overflow / Pointer / Stack buffer overflow / X86 / Computing / Software engineering / Computer programming
Date: 2012-03-21 11:17:55
Software bugs
Data types
Primitive types
Assembly languages
Instruction set architectures
Buffer overflow
Pointer
Stack buffer overflow
X86
Computing
Software engineering
Computer programming

Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis Mingwei Zhang1 , Aravind Prakash2 , Xiaolei Li1 , Zhenkai Liang1 , and Heng Yin2 1 School of Computing, National University

Add to Reading List

Source URL: www.comp.nus.edu.sg

Download Document from Source Website

File Size: 509,69 KB

Share Document on Facebook

Similar Documents

‫رشح مقدمة يف‬  EggHunter Buffer Overflow for Windows Haboob-Team

‫رشح مقدمة يف‬ EggHunter Buffer Overflow for Windows Haboob-Team

DocID: 1uNRb - View Document

B u ffe r o ve rflo w A buffer overflow condition exists when a program attem pts to put m ore data in a buffer than it can hold or when a program attem pts to put data in a m em ory area past a buffer. In this case, a b

B u ffe r o ve rflo w A buffer overflow condition exists when a program attem pts to put m ore data in a buffer than it can hold or when a program attem pts to put data in a m em ory area past a buffer. In this case, a b

DocID: 1u6nA - View Document

A Dynamic Mechanism for Recovering from Buffer Overflow Attacks Stelios Sidiroglou, Giannis Giovanidis, and Angelos D. Keromytis Department of Computer Science, Columbia University, USA {stelios,ig2111,angelos}@cs.columb

A Dynamic Mechanism for Recovering from Buffer Overflow Attacks Stelios Sidiroglou, Giannis Giovanidis, and Angelos D. Keromytis Department of Computer Science, Columbia University, USA {stelios,ig2111,angelos}@cs.columb

DocID: 1tlja - View Document

Q: Exploit Hardening Made Easy  Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

DocID: 1rrtf - View Document

Department of Electrical Engineering and Computer Science  MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I

DocID: 1rlqR - View Document