Back to Results
First PageMeta Content
Computer security / Computer file formats / Software testing / Zero-day attack / Vulnerability / Buffer overflow / Uncontrolled format string / String / File format / Computing / Cyberwarfare / Computer network security


The Art of File Format Fuzzing In September 2004, much hype was made of a buffer overflow vulnerability that existed in the Microsoft engine responsible for processing JPEG files. While the resulting vulnerability itself
Add to Reading List

Document Date: 2014-12-16 19:06:36


Open Document

File Size: 599,83 KB

Share Result on Facebook

City

Reston / /

Company

Adobe / Ernst & Young / iDEFENSE Labs / Microsoft / Information Systems Technology / /

Country

Bermuda / /

Currency

USD / /

/

Facility

George Washington University / University of Alberta / /

IndustryTerm

i.e. web / web browsers / software implementations / public and private networks / border routers / i . e .ii . e ..i . e .ei . e ..i . e . i . e .wi . e .ei . e .bi . e . / /

OperatingSystem

UNIX / Linux / Microsoft Windows / /

Organization

George Washington University / Information Systems Audit and Control Association / Fairfax Volunteer Fire Department / University of Alberta / /

Person

Michael Sutton / Michael Sutton Adam Greene / Adam Greene / /

Position

Security Engineer / Director / Sergeant / Chartered Accountant / Certified Information Systems Auditor / Acrobat / Accountant / member / /

ProgrammingLanguage

XML / /

ProvinceOrState

Alberta / Virginia / /

Technology

XML / File format Protocol / AV / JPEG / Linux / UNIX / ASCII / border routers / Acrobat / /

SocialTag