<--- Back to Details
First PageDocument Content
Software testing / Hacking / Robert C. Seacord / Computer network security / Vulnerability / Secure coding / Buffer overflow / Application security / Uncontrolled format string / Cyberwarfare / Computer security / Security
Date: 2013-09-18 13:11:17
Software testing
Hacking
Robert C. Seacord
Computer network security
Vulnerability
Secure coding
Buffer overflow
Application security
Uncontrolled format string
Cyberwarfare
Computer security
Security

Overview Security Injection Modules

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 962,71 KB

Share Document on Facebook

Similar Documents

A Format String Checker for Java Konstantin Weitz Siwakorn Srisakaokul  University of Washington, USA

A Format String Checker for Java Konstantin Weitz Siwakorn Srisakaokul University of Washington, USA

DocID: 1qbF4 - View Document

Finding Security Vulnerabilities in Java Applications with Static Analysis Benjamin Livshits and Monica S. Lam Computer Science Department

Finding Security Vulnerabilities in Java Applications with Static Analysis Benjamin Livshits and Monica S. Lam Computer Science Department

DocID: 1oWV6 - View Document

String Oriented Programming Circumventing ASLR, DEP, and Other Guards Mathias Payer  ETH Zurich, Switzerland

String Oriented Programming Circumventing ASLR, DEP, and Other Guards Mathias Payer ETH Zurich, Switzerland

DocID: 1o4C4 - View Document

String Oriented Programming: When ASLR is not Enough Mathias Payer Thomas R. Gross  Department of Computer Science

String Oriented Programming: When ASLR is not Enough Mathias Payer Thomas R. Gross Department of Computer Science

DocID: 1nObE - View Document

String Oriented Programming  Circumventing ASLR, DEP, and other Guards Mathias Payer, ETH Zürich

String Oriented Programming Circumventing ASLR, DEP, and other Guards Mathias Payer, ETH Zürich

DocID: 1nCPz - View Document