Stack buffer overflow

Results: 195



#Item
131Software bugs / Data types / Subroutines / C++ / Buffer overflow protection / Control flow / Pointer / Stack / C / Software engineering / Computer programming / Computing

There is Safety in Numbers: Preventing Control-Flow Hijacking by Duplication Job Noorman, Nick Nikiforakis, and Frank Piessens IBBT-DistriNet, KU Leuven [removed]

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-01-01 13:06:09
132Computer programming / Buffer overflow protection / Stack buffer overflow / Buffer overflow / Heap overflow / Pointer / C dynamic memory allocation / Stack / Segmentation fault / Computing / Software engineering / Software bugs

ValueGuard: Protection of native applications against data-only buffer overflows Steven Van Acker, Nick Nikiforakis, Pieter Philippaerts, Yves Younan, and Frank Piessens IBBT-Distrinet Katholieke Universiteit Leuven

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-01-01 13:06:15
133Subroutines / Stack / Call stack / Pointer / Application checkpointing / C / Recursion / Stack machine / Buffer overflow protection / Computing / Software engineering / Computer programming

Portable Checkpointing for Heterogeneous Architectures Balkrishna Ramkumar Volker Strumpen Dept. of Electrical and Computer Engineering

Add to Reading List

Source URL: supertech.csail.mit.edu

Language: English - Date: 2014-09-16 08:27:50
134Memory management / Data Execution Prevention / Control flow / X86 architecture / NX bit / Buffer overflow / Address space layout randomization / Heap overflow / Stack buffer overflow / Computing / Software bugs / Computer errors

Bypassing Browser Memory Protections

Add to Reading List

Source URL: www.azimuthsecurity.com

Language: English - Date: 2010-04-10 04:10:26
135Software bugs / Shellcode / Buffer overflow / Computer file formats / Address space layout randomization / Dynamic-link library / Heap overflow / Stack / Metasploit Project / Computing / Computer security / Cyberwarfare

BYPASSING EMET 4.1 Jared DeMott Security Researcher [removed]

Add to Reading List

Source URL: bromiumlabs.files.wordpress.com

Language: English - Date: 2014-02-24 02:03:23
136Buffer overflow / Stack / Shellcode / Software engineering / Software quality / Assembly languages / Software bugs / Computing / X86

A stack model for symbolic buffer overflow exploitability analysis Extended Abstract Gustavo Grieco University of Grenoble VERIMAG

Add to Reading List

Source URL: dcc.fceia.unr.edu.ar

Language: English - Date: 2013-03-12 10:48:31
137Software bugs / Buffer overflow protection / Buffer overflow / Stack buffer overflow / Stack / GNU Compiler Collection / Pointer / Function prologue / C / Computing / Software engineering / Computer programming

StackGuard: Simple Stack Smash Protection for GCC Perry Wagle Crispin Cowan∗ Immunix, Inc.† [removed], http://www.immunix.com/˜wagle

Add to Reading List

Source URL: gd.tuwien.ac.at

Language: English - Date: 2004-08-30 06:43:08
138Software bugs / Buffer overflow protection / Buffer overflow / Stack buffer overflow / Stack / GNU Compiler Collection / Pointer / Function prologue / C / Computing / Software engineering / Computer programming

StackGuard: Simple Stack Smash Protection for GCC Perry Wagle Crispin Cowan∗ Immunix, Inc.† [removed], http://www.immunix.com/˜wagle

Add to Reading List

Source URL: gd.tuwien.ac.at

Language: English - Date: 2004-08-30 06:43:08
139Software bugs / Shellcode / Buffer overflow / Address space layout randomization / Unistd.h / Transmission Control Protocol / GNU Debugger / Filesystem Hierarchy Standard / Stack / Computing / Software / Computer programming

CONTENTS IN DETAIL 0x100 INTRODUCTION 1

Add to Reading List

Source URL: www.tinker.tv

Language: English - Date: 2012-02-08 15:24:21
140Software quality / Stack buffer overflow / Address space layout randomization / Buffer overflow protection / Return-to-libc attack / Buffer overflow / Stack / Shellcode / FALSE / Computing / Software bugs / Software engineering

Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2014-05-19 16:48:47
UPDATE