Stack buffer overflow

Results: 195



#Item
151Exploit-Generation with Acceleration Daniel Kroening, Matt Lewis, Georg Weissenbacher ●

Exploit-Generation with Acceleration Daniel Kroening, Matt Lewis, Georg Weissenbacher ●

Add to Reading List

Source URL: crest.cs.ucl.ac.uk

Language: English - Date: 2013-06-03 11:21:47
152University of Oxford Computing Laboratory MSc Computer Science Dissertation Automatic Generation of Control Flow Hijacking Exploits for Software Vulnerabilities

University of Oxford Computing Laboratory MSc Computer Science Dissertation Automatic Generation of Control Flow Hijacking Exploits for Software Vulnerabilities

Add to Reading List

Source URL: seanhn.files.wordpress.com

Language: English - Date: 2009-09-06 11:29:07
153

PDF Document

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2012-07-17 11:27:12
154

PDF Document

Add to Reading List

Source URL: force.vnsecurity.net

Language: English - Date: 2010-08-12 21:04:37
155

PDF Document

Add to Reading List

Source URL: force.vnsecurity.net

Language: English - Date: 2010-12-31 02:53:49
156SAINTwriter Exploit Report Report Generated: May 8, [removed]Introduction On May 7, 2011, at 12:35 PM, a penetration test was conducted using the SAINTexploitTM 7.8 exploit tool. The scan discovered a total of three live

SAINTwriter Exploit Report Report Generated: May 8, [removed]Introduction On May 7, 2011, at 12:35 PM, a penetration test was conducted using the SAINTexploitTM 7.8 exploit tool. The scan discovered a total of three live

Add to Reading List

Source URL: vulnerabilityassessment.co.uk

Language: English - Date: 2011-05-08 05:15:47
157

PDF Document

Add to Reading List

Source URL: force.vnsecurity.net

Language: English - Date: 2010-08-12 21:04:43
158IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. XX, NO. X, MONTH[removed]An Attack Surface Metric Pratyusa K. Manadhata, Member, IEEE, and Jeannette M. Wing, Fellow, IEEE

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. XX, NO. X, MONTH[removed]An Attack Surface Metric Pratyusa K. Manadhata, Member, IEEE, and Jeannette M. Wing, Fellow, IEEE

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2010-05-13 19:55:15
159SAINTwriter Exploit Report Report Generated: May 8, [removed]Introduction On May 7, 2011, at 12:35 PM, a penetration test was conducted using the SAINTexploitTM 7.8 exploit tool. The scan discovered a total of three live

SAINTwriter Exploit Report Report Generated: May 8, [removed]Introduction On May 7, 2011, at 12:35 PM, a penetration test was conducted using the SAINTexploitTM 7.8 exploit tool. The scan discovered a total of three live

Add to Reading List

Source URL: vulnerabilityassessment.co.uk

Language: English - Date: 2011-05-08 05:16:25
160Microsoft Word - CWEs_as_vuln_theory.doc

Microsoft Word - CWEs_as_vuln_theory.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-07-18 14:25:17