Stack buffer overflow

Results: 195



#Item
71First published November 8, 1996. Original raw text file: http://www.phrack.com/issues.html?issue=49&id=14&mode=txt This version is based on an HTML conversion by Prabhaker Mateti. It fixes errors in the original, with n

First published November 8, 1996. Original raw text file: http://www.phrack.com/issues.html?issue=49&id=14&mode=txt This version is based on an HTML conversion by Prabhaker Mateti. It fixes errors in the original, with n

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2015-03-30 03:44:45
72ThreadX Run-time Stack Checking Run-time Stack Checking is a standard feature of ThreadX that can be enabled by the user when building the ThreadX Library. The Run-Time Stack Checking feature identifies stack corruption

ThreadX Run-time Stack Checking Run-time Stack Checking is a standard feature of ThreadX that can be enabled by the user when building the ThreadX Library. The Run-Time Stack Checking feature identifies stack corruption

Add to Reading List

Source URL: rtos.com

Language: English - Date: 2012-05-01 15:04:18
73Heap Taichi: Exploiting Memory Allocation Granularity in Heap-Spraying Attacks Yu Ding1,2 , Tao Wei1,2∗, TieLei Wang1,2 , Zhenkai Liang3 , Wei Zou1,2 , Institute of Computer Science and Technology, Peking University Ke

Heap Taichi: Exploiting Memory Allocation Granularity in Heap-Spraying Attacks Yu Ding1,2 , Tao Wei1,2∗, TieLei Wang1,2 , Zhenkai Liang3 , Wei Zou1,2 , Institute of Computer Science and Technology, Peking University Ke

Add to Reading List

Source URL: lenx.100871.net

Language: English - Date: 2012-05-09 22:08:36
74Reversed Buffer Overflow Cross Stack Attacks Kris Kaspersky Endeavor Security, Inc.

Reversed Buffer Overflow Cross Stack Attacks Kris Kaspersky Endeavor Security, Inc.

Add to Reading List

Source URL: www.powerofcommunity.net

Language: English - Date: 2008-10-21 20:13:04
75Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software James Newsome  Carnegie Mellon University Abstract

Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software James Newsome Carnegie Mellon University Abstract

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:29
76Sweeper: A Lightweight End-to-End System for Defending Against Fast Worms Joseph Tucek Shan Lu, Chengdu Huang, Spiros Xanthos Yuanyuan Zhou

Sweeper: A Lightweight End-to-End System for Defending Against Fast Worms Joseph Tucek Shan Lu, Chengdu Huang, Spiros Xanthos Yuanyuan Zhou

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:29
77Guarded Memory Move (GMM) White Paper VERSION 0.5 Guarded Memory Move (GMM) Buffer Overflow Detection And Analysis Davide Libenzi

Guarded Memory Move (GMM) White Paper VERSION 0.5 Guarded Memory Move (GMM) Buffer Overflow Detection And Analysis Davide Libenzi

Add to Reading List

Source URL: xmailserver.org

Language: English - Date: 2007-02-16 03:03:26
78Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications David Brumley, Pongsin Poosankam Dawn Song Jiang Zheng {dbrumley,ppoosank}@cs.cmu.edu

Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications David Brumley, Pongsin Poosankam Dawn Song Jiang Zheng {dbrumley,ppoosank}@cs.cmu.edu

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2013-09-09 05:44:56
79Automatically Patching Errors in Deployed Software Jeff H. Perkinsα , Sunghun Kimβ , Sam Larsenγ , Saman Amarasingheα , Jonathan Bachrachα , Michael Carbinα , Carlos Pachecoδ , Frank Sherwood, Stelios Sidiroglouα

Automatically Patching Errors in Deployed Software Jeff H. Perkinsα , Sunghun Kimβ , Sam Larsenγ , Saman Amarasingheα , Jonathan Bachrachα , Michael Carbinα , Carlos Pachecoδ , Frank Sherwood, Stelios Sidiroglouα

Add to Reading List

Source URL: www.cse.ust.hk

Language: English - Date: 2012-06-14 09:36:59