Back to Results
First PageMeta Content
Computer programming / Address space layout randomization / PaX / Buffer overflow / Position-independent code / Stack buffer overflow / Return-to-libc attack / Memory safety / C dynamic memory allocation / Computing / Software bugs / Software


Document Date: 2009-01-19 10:51:06


Open Document

File Size: 234,15 KB

Share Result on Facebook

City

Reston / /

Company

Dell / Worrisome SOftware / Distributed Computing Systems / James E. Just Global InfoTek Inc. / Microsoft / /

Currency

pence / CVE / /

/

Facility

Library MSSQL / R. Sekar Stony Brook University / /

IndustryTerm

web browsers / runtime infrastructure / rebase tool / system services / user applications / software / compiletime solution / benign applications / office applications / Internet Explorer / /

OperatingSystem

Windows Vista / UNIX / XP / Linux / Windows XP / Windows 2000 / Microsoft Windows / Windows NT / Microsoft Vista / /

Organization

National Science Foundation / U.S. Government / R. Sekar Stony Brook University / ASR / Thread Environment Block Process Environment Block Command / Defense Advanced Research Project Agency / /

Person

Michael Howard / Saman Amarasinghe / Hiroaki Etoh / Elena Gabriela Barrantes / Micheal Hicks / Karl Levitt / Dan Grossman / Angelos D. Keromytis / Jason Minto / Bryce Cogswell / Stephanie Forrest / Zbigniew Kalbarczyk / Tufan Demir / Westley Weimer / Perry Wagle / Kunikazu Yoda / Crispin Cowan / Dino Dai Zovi / George C. Necula / Steve Beattie / Cheney / Derek Bruening / David H. Ackley / Jason Li / Timothy Tsai / R. Sekar / Trevor Jim / Ravishankar K. Iyer / Sandeep Bhatkar / Paul H. J. Kelly / Mark Cornwell / Scott McPeak / Mark Russinovich / Dobb / Wei Xu / Daniel C. Duvarney / Manish Prasad / Gaurav S. Kc / Jun Xu / Darko Stefanovi / Navjot Singh / Greg Morrisett / Arash Baratloo / Vladimir Kiriansky / Robert W. M. Jones / Vassilis Prevelakis / John Johansen / /

Position

driver / custom boot-driver / boot driver / kernel driver / kernel-mode driver / boot-time driver / programmer / /

Product

Windows XP / Microsoft Windows / MSDE Microsoft RPC DCOM Attack Type Stack smash/code injection Heap overflow/code injection Stack smash/code injection Stack smash/code injection / Metasploit / Windbg / /

ProgrammingLanguage

C / SQL / /

Technology

Linux / UNIX / API / operating system / operating systems / Diversity Algorithms / virtual memory / /

URL

www.google.com / www.internals.com/articles/apispy/apispy.htm / http /

SocialTag