Stack Overflow

Results: 257



#Item
201C Standard Library / Computer errors / Stack buffer overflow / Return-to-libc attack / Address space layout randomization / Buffer overflow / MOV / X86 / Printf format string / Computing / Computer architecture / Software bugs

PDF Document

Add to Reading List

Source URL: force.vnsecurity.net

Language: English - Date: 2010-08-12 21:04:37
202Software engineering / Return-to-libc attack / Address space layout randomization / PaX / Buffer overflow / NX bit / Exec Shield / Stack overflow / Stack / Software bugs / Computing / Software quality

PDF Document

Add to Reading List

Source URL: force.vnsecurity.net

Language: English - Date: 2010-12-31 02:53:49
203Software bugs / Software testing / Hacking / SAINT / Buffer overflow / Exploit / Vulnerability / Stack buffer overflow / Cross-site scripting / Cyberwarfare / Computer security / Computing

SAINTwriter Exploit Report Report Generated: May 8, [removed]Introduction On May 7, 2011, at 12:35 PM, a penetration test was conducted using the SAINTexploitTM 7.8 exploit tool. The scan discovered a total of three live

Add to Reading List

Source URL: vulnerabilityassessment.co.uk

Language: English - Date: 2011-05-08 05:15:47
204System software / Return-to-libc attack / PaX / Address space layout randomization / NX bit / Buffer overflow / Exec Shield / Stack / ASCII / Software bugs / Computing / Software

PDF Document

Add to Reading List

Source URL: force.vnsecurity.net

Language: English - Date: 2010-08-12 21:04:43
205Security / Computer network security / Hacking / Software testing / Attack surface / Vulnerability / Buffer overflow / RSA / Stack / Computer security / Cyberwarfare / Electronic commerce

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. XX, NO. X, MONTH[removed]An Attack Surface Metric Pratyusa K. Manadhata, Member, IEEE, and Jeannette M. Wing, Fellow, IEEE

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2010-05-13 19:55:15
206Software bugs / Software testing / Hacking / SAINT / Buffer overflow / Vulnerability / Exploit / Stack buffer overflow / Cross-site scripting / Cyberwarfare / Computer security / Failure

SAINTwriter Exploit Report Report Generated: May 8, [removed]Introduction On May 7, 2011, at 12:35 PM, a penetration test was conducted using the SAINTexploitTM 7.8 exploit tool. The scan discovered a total of three live

Add to Reading List

Source URL: vulnerabilityassessment.co.uk

Language: English - Date: 2011-05-08 05:16:25
207Computer security / Buffer overflow / Heap overflow / Circular buffer / Integer overflow / Vulnerability / Code injection / Pointer / Stack overflow / Computing / Software bugs / Cyberwarfare

Microsoft Word - CWEs_as_vuln_theory.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-07-18 14:25:17
208Java programming language / Computing platforms / Java platform / Application programming interface / Technical communication / Stack Overflow / Google App Engine / Java / Google Code / Computing / Software / Cross-platform software

Crowd Documentation: Exploring the Coverage and the Dynamics of API Discussions on Stack Overflow Chris Parnin College of Computing Georgia Tech Atlanta, GA USA

Add to Reading List

Source URL: www.cc.gatech.edu

Language: English - Date: 2012-05-25 00:03:15
209Computer programming / Buffer overflow protection / Stack buffer overflow / Buffer overflow / Heap overflow / Pointer / C dynamic memory allocation / Stack / Segmentation fault / Computing / Software engineering / Software bugs

ValueGuard: Protection of native applications against data-only buffer overflows Steven Van Acker, Nick Nikiforakis, Pieter Philippaerts, Yves Younan, and Frank Piessens IBBT-Distrinet Katholieke Universiteit Leuven

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2011-05-26 17:50:53
210Computer programming / Buffer overflow / Pointer / Address space layout randomization / Stack / Shellcode / C / Uncontrolled format string / Memory corruption / Computing / Software bugs / Software engineering

0 CPM: Masking Code Pointers to Prevent Code Injection Attacks PIETER PHILIPPAERTS, YVES YOUNAN, STIJN MUYLLE and FRANK PIESSENS, DistriNet Research Group, University of Leuven SVEN LACHMUND and THOMAS WALTER, DOCOMO Eu

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-11-05 16:02:36
UPDATE