<--- Back to Details
First PageDocument Content
Software bugs / Address space layout randomization / PaX / Buffer overflow / Stack buffer overflow / Heap overflow / JIT spraying / Uncontrolled format string / Heap spraying / Computer security / Computing / Cyberwarfare
Date: 2012-07-17 11:27:12
Software bugs
Address space layout randomization
PaX
Buffer overflow
Stack buffer overflow
Heap overflow
JIT spraying
Uncontrolled format string
Heap spraying
Computer security
Computing
Cyberwarfare

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Download Document from Source Website

File Size: 514,19 KB

Share Document on Facebook

Similar Documents

Software bugs / Computer programming / Software engineering / Computing / Buffer overflow / Stack / Arbitrary code execution / Subroutine / Stack buffer overflow

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I

DocID: 1rlqR - View Document

Software bugs / Computing / Software engineering / Computer programming / Computer errors / Subroutines / Memory management / Stack / Buffer overflow / Call stack / Stack buffer overflow

b The heap sucks The Stack is Back – Jon Oberheide

DocID: 1pRdF - View Document

Software bugs / C POSIX library / Write / Find / Stack / D / Buffer overflow / Subroutine

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I

DocID: 1pkFG - View Document

Software bugs / Buffer overflow protection / Buffer overflow / Return-to-libc attack / Stack / Subroutine / C standard library / Stack buffer overflow / Return-oriented programming

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

DocID: 1oK9c - View Document

Central processing unit / Machine code / Software bugs / Return-oriented programming / Computer memory / Instruction set architectures / Buffer overflow protection / Self-modifying code / Subroutine / Stack / Return-to-libc attack / Instruction set

CFIMon: Detecting Violation of Control Flow Integrity using Performance Counters Yubin Xia† ‡, Yutao Liu† ‡, Haibo Chen†, Binyu Zang‡ †Institute of Parallel and Distributed Systems, Shanghai Jiao Tong Unive

DocID: 1odF8 - View Document