Back to Results
First PageMeta Content
Computer programming / Buffer overflow / Pointer / Address space layout randomization / Stack / Shellcode / C / Uncontrolled format string / Memory corruption / Computing / Software bugs / Software engineering


0 CPM: Masking Code Pointers to Prevent Code Injection Attacks PIETER PHILIPPAERTS, YVES YOUNAN, STIJN MUYLLE and FRANK PIESSENS, DistriNet Research Group, University of Leuven SVEN LACHMUND and THOMAS WALTER, DOCOMO Eu
Add to Reading List

Document Date: 2013-11-05 16:02:36


Open Document

File Size: 288,28 KB

Share Result on Facebook

City

Leuven / Munich / New York / /

Company

ACM Inc. / RTL / Google / Microsoft / /

Country

Germany / Belgium / United States / /

Currency

USD / CVE / /

/

Facility

Penn Plaza / University of Leuven / National Institute of Standards and Technology / University of Leuven SVEN LACHMUND / C library / /

/

IndustryTerm

large applications / Internet Explorer3 / large software / return site / particular solution / /

MusicAlbum

AND / /

OperatingSystem

Linux / /

Organization

National Institute of Standards and Technology / University of Leuven / U.S. Securities and Exchange Commission / Chinese government / /

Person

PIETER PHILIPPAERTS / THOMAS WALTER / SVEN LACHMUND / YVES YOUNAN / /

/

Position

Compilers General / programmer / /

Product

SQL injection / iPhone / INJECTION ATTACKS Code injection / Advanced Attacks Code injection / Prevent Code Injection / Code injection / /

ProgrammingLanguage

C / /

ProvinceOrState

New York / /

Technology

Linux / pointer encryption / Shared Memory / operating systems / /

URL

http /

SocialTag