Stack buffer overflow

Results: 195



#Item
171

PDF Document

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-02-25 04:08:30
172

PDF Document

Add to Reading List

Source URL: www.checkpoint.com

Language: English - Date: 2004-09-08 13:49:16
173Obfuscated Weird Language - Wikipedia, the free encyclopedia  http://en.wikipedia.org/w/index.php?title=Obfuscated_Weird_Lang... Obfuscated Weird Language From Wikipedia, the free encyclopedia

Obfuscated Weird Language - Wikipedia, the free encyclopedia http://en.wikipedia.org/w/index.php?title=Obfuscated_Weird_Lang... Obfuscated Weird Language From Wikipedia, the free encyclopedia

Add to Reading List

Source URL: digilander.libero.it

Language: English - Date: 2009-06-07 02:49:43
174University of Oxford Computing Laboratory MSc Computer Science Dissertation Automatic Generation of Control Flow Hijacking Exploits for Software Vulnerabilities

University of Oxford Computing Laboratory MSc Computer Science Dissertation Automatic Generation of Control Flow Hijacking Exploits for Software Vulnerabilities

Add to Reading List

Source URL: www.cprover.org

Language: English - Date: 2009-10-05 15:17:48
175Bypassing Browser Memory Protections Setting back browser security by 10 years Alexander Sotirov <alex@sotirov.net> Mark Dowd <markdowd@au1.ibm.com>  Introduction

Bypassing Browser Memory Protections Setting back browser security by 10 years Alexander Sotirov Mark Dowd Introduction

Add to Reading List

Source URL: www.phreedom.org

Language: English - Date: 2013-06-01 20:57:45
176Linux exploit development part 4 - ASCII armor bypass + return-to-plt  NOTE: In case you missed my previous papers you can check them out here: Linux exploit development part 1 - Stack overflow Linux Exploit Writing Tuto

Linux exploit development part 4 - ASCII armor bypass + return-to-plt NOTE: In case you missed my previous papers you can check them out here: Linux exploit development part 1 - Stack overflow Linux Exploit Writing Tuto

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2011-05-14 09:23:46
177On the Effectiveness of Address-Space Randomization Hovav Shacham Matthew Page  Ben Pfaff

On the Effectiveness of Address-Space Randomization Hovav Shacham Matthew Page Ben Pfaff

Add to Reading List

Source URL: benpfaff.org

Language: English - Date: 2014-06-05 00:52:52
178http://www.dwheeler.com  http://www.dwheeler.com

http://www.dwheeler.com http://www.dwheeler.com

Add to Reading List

Source URL: www.dwheeler.com

Language: English - Date: 2003-03-30 17:30:31
179Building Diverse Computer Systems Stephanie Forrest Dept. of Computer Science

Building Diverse Computer Systems Stephanie Forrest Dept. of Computer Science

Add to Reading List

Source URL: www.cs.unm.edu

Language: English - Date: 1998-10-29 11:43:14
180Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade* Crispin Cowan, Perry Wagle, Calton Pu,

Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade* Crispin Cowan, Perry Wagle, Calton Pu,

Add to Reading List

Source URL: tmp-www.cpe.ku.ac.th

Language: English - Date: 2005-10-31 05:38:18