<--- Back to Details
First PageDocument Content
Computing / Software bugs / Software engineering / Computer security / Stack buffer overflow / Buffer overflow / Secure coding / Code injection / Uncontrolled format string / Off-by-one error / Memory safety / Pointer
Date: 2017-08-25 10:56:26
Computing
Software bugs
Software engineering
Computer security
Stack buffer overflow
Buffer overflow
Secure coding
Code injection
Uncontrolled format string
Off-by-one error
Memory safety
Pointer

Paxson Spring 2017 CS 161 Computer Security

Add to Reading List

Source URL: www-inst.cs.berkeley.edu

Download Document from Source Website

File Size: 192,16 KB

Share Document on Facebook

Similar Documents

Computing / Software engineering / Computer programming / Type theory / Data types / Cross-platform software / Object-oriented programming languages / C standard library / Printf format string / Comparison of programming languages / Uncontrolled format string / Type system

A Format String Checker for Java Konstantin Weitz Siwakorn Srisakaokul University of Washington, USA

DocID: 1qbF4 - View Document

Computer network security / Hacking / Code audit / Information technology audit / Vulnerability / Cross-site scripting / SQL injection / Web application security / Code injection / Uncontrolled format string / Application security / Computer security

Finding Security Vulnerabilities in Java Applications with Static Analysis Benjamin Livshits and Monica S. Lam Computer Science Department

DocID: 1oWV6 - View Document

Computing / Software engineering / Software / Software bugs / Buffer overflow / Stack buffer overflow / Address space layout randomization / PaX / Uncontrolled format string / Pointer / Stack / Printf format string

String Oriented Programming Circumventing ASLR, DEP, and Other Guards Mathias Payer ETH Zurich, Switzerland

DocID: 1o4C4 - View Document

Computing / Computer security / Software / Software bugs / C standard library / Address space layout randomization / Return-oriented programming / Stack buffer overflow / Return-to-libc attack / Buffer overflow / PaX / Uncontrolled format string

String Oriented Programming: When ASLR is not Enough Mathias Payer Thomas R. Gross Department of Computer Science

DocID: 1nObE - View Document

Computing / Software bugs / Software engineering / Buffer overflow / Computer memory / Address space layout randomization / Stack / Pointer / Uncontrolled format string / Stack buffer overflow

String Oriented Programming Circumventing ASLR, DEP, and other Guards Mathias Payer, ETH Zürich

DocID: 1nCPz - View Document