Back to Results
First PageMeta Content
Software quality / Stack buffer overflow / Buffer overflow protection / Buffer overflow / Address space layout randomization / PaX / Heap overflow / Return-to-libc attack / Exec Shield / Software bugs / Computing / Computer security


(un) Smashing the Stack: 66ee66dd66bb 33aa6e
Add to Reading List

Document Date: 2015-05-28 15:51:26


Open Document

File Size: 154,29 KB

Share Result on Facebook

Company

HP / AMD / Intrinsa / Symantec / Intel / Microsoft / /

Country

United States / /

Currency

USD / /

Event

M&A / /

Facility

C library / /

IndustryTerm

software noexec implementation / software emulation / internet worm / vulnerable applications / vendor products / software developers / software-based nonexecutable stacks / aggressive code auditing / software non-executable stack / web application threats / web server / commodity operating systems / /

OperatingSystem

Unix / MacOS / SunOS / Linux / Ubuntu / OpenBSD / Slackware / BSD / Solaris / Microsoft Windows / HP-UX / POSIX / Microsoft Vista / /

Organization

US Department of Homeland Security / UCSD / Fight Club / Stanford / /

Person

Hiroaki Etoh / Pete Silberman / Ollie Whitehouse / Tyler Durden / Hannibal / Richard Johnson / Crispin Cowan / Jon Richard Moser / Shawn Moyer / Gene Spafford / Gerhard Eschelbeck / Ben Hawkes / Gerardo Richarte / Dominique Brezinski / Krerk Piromposa / Thomas Ptacek / Thomas Lopatic / Richard Embody / Tim Newsham / Dave Maynor / Theo DeRaadt / /

Position

guard / administrator / CIO / Major / Chief Researcher / /

ProgrammingLanguage

Lisp / ALGOL / C / ANSI C / C++ / /

Technology

Alpha / ANSI C / Linux / Unix / operating systems / cryptography / firewall / ISP / paging / web server / /

URL

http /

SocialTag