Back to Results
First PageMeta Content
Software bugs / Address space layout randomization / PaX / Buffer overflow / Stack buffer overflow / Heap overflow / JIT spraying / Uncontrolled format string / Heap spraying / Computer security / Computing / Cyberwarfare


Document Date: 2012-07-17 11:27:12


Open Document

File Size: 514,19 KB

Share Result on Facebook

City

Canary / /

Company

Intel / Microsoft / PaX Team / /

Event

Product Release / /

Facility

University of London Abstract / The Network Institute / VU University / /

IndustryTerm

dangerous software errors / Internet Worm / web browser clients / non-executable stack solution / software implementations / web vulnerabilities / software vulnerabilities / web exploits / legacy applications / Internet Explorer / web developing technique / /

OperatingSystem

Windows Vista / Unix / Windows XP / Linux / Microsoft Windows / GNU / OpenBSD / Windows Server 2008 / /

Organization

Computer Emergency Response Team Coordination Center / VU University Amsterdam / University of London Abstract / European Union / PC / Network Institute / /

Person

Mark Dowd / Tyler Durden / Solar Designer / Rafal Wojtczuk (Nergal) / David Litchfield / Thomas Lopatic / Matt Miller / Scott Chasin / Dion Blazakis / Elias Levy / Alexander Peslyak / Matt Conover / Tim Newsham / Robert T. Morris / Sharabani Dowd / Peiter Zatko / /

Position

Major / General / /

Product

Service Pack 2 (SP2) / /

ProgrammingLanguage

ActionScript / C / JavaScript / C++ / /

Technology

ActionScript / Java / Unix / Linux / HTTP / Flash / /

SocialTag