String Buffer

Results: 87



#Item
71

PDF Document

Add to Reading List

Source URL: force.vnsecurity.net

Language: English - Date: 2010-08-12 21:04:37
72Microsoft Word - unforgivable 3.doc

Microsoft Word - unforgivable 3.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-09-13 16:51:18
73Microsoft Word - unforgivable 3.doc

Microsoft Word - unforgivable 3.doc

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-09-10 12:41:21
740 CPM: Masking Code Pointers to Prevent Code Injection Attacks PIETER PHILIPPAERTS, YVES YOUNAN, STIJN MUYLLE and FRANK PIESSENS, DistriNet Research Group, University of Leuven  SVEN LACHMUND and THOMAS WALTER, DOCOMO Eu

0 CPM: Masking Code Pointers to Prevent Code Injection Attacks PIETER PHILIPPAERTS, YVES YOUNAN, STIJN MUYLLE and FRANK PIESSENS, DistriNet Research Group, University of Leuven SVEN LACHMUND and THOMAS WALTER, DOCOMO Eu

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-11-05 16:02:36
75Runtime countermeasures for code injection attacks against C and C++ programs YVES YOUNAN, WOUTER JOOSEN and FRANK PIESSENS Katholieke Universiteit Leuven  The lack of memory-safety in C/C++ often leads to vulnerabilitie

Runtime countermeasures for code injection attacks against C and C++ programs YVES YOUNAN, WOUTER JOOSEN and FRANK PIESSENS Katholieke Universiteit Leuven The lack of memory-safety in C/C++ often leads to vulnerabilitie

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-02-27 15:05:36
76Breaking the memory secrecy assumption Raoul Strackx Yves Younan  Pieter Philippaerts

Breaking the memory secrecy assumption Raoul Strackx Yves Younan Pieter Philippaerts

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-03-01 01:14:43
77Protecting global and static variables from buffer overflow attacks Yves Younan Frank Piessens  Wouter Joosen

Protecting global and static variables from buffer overflow attacks Yves Younan Frank Piessens Wouter Joosen

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-03-01 01:16:09
78

PDF Document

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-02-25 04:08:30
79Secure Coding Guide  Contents Introduction to Secure Coding Guide 7 At a Glance 7

Secure Coding Guide Contents Introduction to Secure Coding Guide 7 At a Glance 7

Add to Reading List

Source URL: developer.apple.com

Language: English - Date: 2014-03-11 00:58:28
8021 21 Collections of data As illustrated in the

21 21 Collections of data As illustrated in the "Air Traffic Controller" example in Chapter 20, arrays can be used to store collections of data. But arrays do have limitations (e.g. you have to specify a maximum size), a

Add to Reading List

Source URL: www.uow.edu.au

Language: English - Date: 2001-01-07 17:04:59