Stack overflow

Results: 257



#Item
11Computing / Education / Information / Educational psychology / Gamification / Stack Exchange network / Stack Overflow / Educational technology / Data visualization / Database / Visualization / Freebase

TechLand: Assisting Technology Landscape Inquiries with Insights from Stack Overflow Chunyang Chen, Zhenchang Xing, Lei Han School of Computer Engineering, Nanyang Technological University, Singapore .s

Add to Reading List

Source URL: ccywch.github.io

Language: English - Date: 2016-08-07 09:43:02
12Software bugs / Computing / Software engineering / Computer programming / Computer errors / Subroutines / Memory management / Stack / Buffer overflow / Call stack / Stack buffer overflow

b The heap sucks The Stack is Back – Jon Oberheide

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-11 18:23:09
13Software bugs / C POSIX library / Write / Find / Stack / D / Buffer overflow / Subroutine

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
14Cross-platform software / Stack Exchange network / JavaScript libraries / Gamification / Stack Overflow / Ajax / JavaScript / ASP.NET / JQuery / Stack Exchange / Django / Modelviewcontroller

Mining Technology Landscape from Stack Overflow Chunyang Chen Zhenchang Xing School of Computer Science and Engineering

Add to Reading List

Source URL: ccywch.github.io

Language: English - Date: 2016-08-07 09:43:02
15Software bugs / Buffer overflow protection / Buffer overflow / Return-to-libc attack / Stack / Subroutine / C standard library / Stack buffer overflow / Return-oriented programming

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
16Central processing unit / Machine code / Software bugs / Return-oriented programming / Computer memory / Instruction set architectures / Buffer overflow protection / Self-modifying code / Subroutine / Stack / Return-to-libc attack / Instruction set

CFIMon: Detecting Violation of Control Flow Integrity using Performance Counters Yubin Xia† ‡, Yutao Liu† ‡, Haibo Chen†, Binyu Zang‡ †Institute of Parallel and Distributed Systems, Shanghai Jiao Tong Unive

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2012-08-23 22:16:01
17Computing / Software engineering / Software / Software bugs / Buffer overflow / Stack buffer overflow / Address space layout randomization / PaX / Uncontrolled format string / Pointer / Stack / Printf format string

String Oriented Programming Circumventing ASLR, DEP, and Other Guards Mathias Payer ETH Zurich, Switzerland

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
18Internet search engines / Alphabet Inc. / Stack Overflow / Google Search / Bing / Google Trends / Stack / Google / Search engine optimization / Web search engine / Search engine technology / ASP.NET MVC

Towards Correlating Search on Google and Asking on Stack Overflow Chunyang Chen and Zhenchang Xing School of Computer Engineering, Nanyang Technological University, Singapore ;

Add to Reading List

Source URL: ccywch.github.io

Language: English - Date: 2016-06-16 04:49:45
19Computing / Computer security / Software / Software bugs / C standard library / Address space layout randomization / Return-oriented programming / Stack buffer overflow / Return-to-libc attack / Buffer overflow / PaX / Uncontrolled format string

String Oriented Programming: When ASLR is not Enough Mathias Payer Thomas R. Gross Department of Computer Science

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
20

Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
    UPDATE