Stack buffer overflow

Results: 195



#Item
121Computer security / Cross-platform software / Buffer overflow / HTTP cookie / C / Stack / Computing / Software engineering / Software bugs

Writing Secure Applications in Scheme Win Treese Serissa Research, Inc. [removed] 13 October 2003

Add to Reading List

Source URL: www.treese.org

Language: English - Date: 2003-12-27 12:57:42
122Computer security / Stack buffer overflow / Buffer overflow / Shellcode / Address space layout randomization / Stack / Pointer / PaX / Heap overflow / Software bugs / Computing / Software quality

\x90\x90\x90\x90\x90\x90\x90\x90 Stack Smashing as of Today A State-of-the-Art Overview on Buffer Overflow Protections

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
123Software engineering / Stack buffer overflow / Buffer overflow / Address space layout randomization / PaX / Heap overflow / NX bit / Uncontrolled format string / Stack / Computing / Software bugs / Software quality

Buffer overflows on linux-x86-64 Hagen Fritsch Technische Universit¨at M¨unchen January 22nd, 2009

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
124X86 architecture / Computer errors / X86 instructions / Assembly languages / Stack buffer overflow / X86 / MOV / Return-to-libc attack / Stack / Computing / Computer architecture / Software engineering

Smashing the stack, an example from 2013 by Benjamin Randazzo August 2013 Stack overflow vulnerabilities have been made harder and harder to exploit over the years as

Add to Reading List

Source URL: www.exploit-db.com

Language: English
125Software bugs / Buffer overflow / Memory safety / Stack buffer overflow / Circular buffer / Splint / C string handling / Defensive programming / C standard library / Computing / Computer programming / Software engineering

Statically Detecting Likely Buffer Overflow Vulnerabilities David Larochelle [removed] University of Virginia, Department of Computer Science David Evans [removed]

Add to Reading List

Source URL: lclint.cs.virginia.edu

Language: English - Date: 2001-12-31 15:21:50
126Central processing unit / Subroutines / Software bugs / Calling convention / Buffer overflow protection / Call stack / Register window / Function prologue / Stack buffer overflow / Computing / Computer architecture / Software engineering

When Good Instructions Go Bad: Generalizing Return-Oriented Programming to RISC Erik Buchanan, Ryan Roemer, Hovav Shacham, and Stefan Savage Department of Computer Science & Engineering University of California, San Dieg

Add to Reading List

Source URL: www.erikbuchanan.com

Language: English - Date: 2009-08-09 03:38:01
127C Standard Library / Computer errors / Stack buffer overflow / Return-to-libc attack / Address space layout randomization / Buffer overflow / MOV / X86 / Printf format string / Computing / Computer architecture / Software bugs

Payload already inside: data re-use for ROP exploits

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:53:12
128Subroutines / Theoretical computer science / Software bugs / Recursion / Call graph / Compiler construction / Stack / Buffer overflow / Call stack / Computer programming / Software engineering / Computing

Efficient Context-Sensitive Intrusion Detection Jonathon T. Giffin Somesh Jha Barton P. Miller

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:45
129Software bugs / Stack buffer overflow / Memory safety / Buffer overflow / Vulnerability / Arbitrary code execution / Rootkit / Shellcode / Code injection / Computer security / Cyberwarfare / Computing

Recent Developments in Low-Level Software Security Pieter Agten, Nick Nikiforakis, Raoul Strackx, Willem De Groef, and Frank Piessens IBBT-Distrinet, Katholieke Universiteit Leuven, Belgium, [removed]uve

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-01-01 13:06:02
130Computer security / Buffer overflow protection / Buffer overflow / Stack buffer overflow / PaX / Memory safety / Address space layout randomization / JIT spraying / Setjmp.h / Computing / Software bugs / Software engineering

RIPE: Runtime Intrusion Prevention Evaluator John Wilander Nick Nikiforakis Dept of Computer Science,

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-01-01 13:06:04
UPDATE