Back to Results
First PageMeta Content
Software bugs / Memory safety / Pointer / Stack buffer overflow / PaX / Buffer overflow / C / Vulnerability / Debugging / Computing / Software engineering / Computer programming


MemSherlock: An Automated Debugger for Unknown Memory Corruption Vulnerabilities ∗ Emre C. Sezer Peng Ning Chongkyung Kil Department of Computer Science
Add to Reading List

Document Date: 2011-11-09 13:26:03


Open Document

File Size: 221,74 KB

Share Result on Facebook

City

Alexandria / /

Company

UPS / ABSTRACT General Terms Software / Computer-Communication Networks / Microsoft / Jun Xu Google Inc. / /

Country

United States / /

Currency

USD / /

/

Event

Product Issues / /

Facility

Computer Science North Carolina State University / Null HTTP Certain library / C library / /

IndustryTerm

detection systems / real-world applications / telnet server Web server / invasive software / memory level monitoring tools / dwarfdump tool / pre-debugging tools / computer systems / vulnerable applications / security debugging tool / software security / call site / intrusion detection systems / Internet security problems / static analysis tool / network service applications / potential software vulnerabilities / software vulnerabilities / vulnerable systems / mainstream operating systems / management policy server / unknown software vulnerabilities / test applications / /

OperatingSystem

Mac OS / Linux / Microsoft Windows / /

Organization

U.S. Army Research Office / Emre C. Sezer Peng Ning Chongkyung Kil Department / Embedded Assembly / North Carolina State University / /

Person

James Newsome / Dawn Song / Keith Irwin / Prachi Gauriar / /

/

Position

Code Surfer / manager meta data / memory manager / programmer / /

Product

data / /

ProgrammingLanguage

FP / Ruby / C / /

ProvinceOrState

Virginia / /

Technology

Linux / HTTP 1.1 / http / mp3 / virtual memory / operating systems / Web server / /

SocialTag