<--- Back to Details
First PageDocument Content
Software bugs / Shellcode / Address space layout randomization / Kernel / Linux kernel / Architecture of Windows NT / Loadable kernel module / Integer overflow
Date: 2016-08-09 05:04:08
Software bugs
Shellcode
Address space layout randomization
Kernel
Linux kernel
Architecture of Windows NT
Loadable kernel module
Integer overflow

Exploitation techniques for NT kernel Adrien ‘Adr1’ Garin Introduction

Add to Reading List

Source URL: www.lse.epita.fr

Download Document from Source Website

File Size: 955,00 KB

Share Document on Facebook

Similar Documents

Appeared in Proceedings of the 34th International Conference on Software Engineering (ICSE), Zurich, Switzerland, JuneUnderstanding Integer Overflow in C/C++ Will Dietz,∗ Peng Li,† John Regehr,† and Vikram

DocID: 1ukEd - View Document

Appeared in Proceedings of the 34th International Conference on Software Engineering (ICSE), Zurich, Switzerland, JuneUnderstanding Integer Overflow in C/C++ Will Dietz,∗ Peng Li,† John Regehr,† and Vikram

DocID: 1u8Gm - View Document

Software bugs / Computing / Software engineering / Computer programming / Buffer overflow / C dynamic memory allocation / Integer overflow / Pointer

Phasing out UNIX beforeUNIX and C are obsolete Andreas Bogk and Hannes Mehnert What The Hack,

DocID: 1qYcg - View Document

Software engineering / Software / Computing / C / Programming language implementation / Frama-C / Data types / Undefined behavior / Integer overflow / C99 / Exception handling / Unspecified behavior

Annotation Generation Frama-C’s annotation generator plug-in for Frama-C Aluminium

DocID: 1qvDf - View Document

Computer arithmetic / Data types / Primitive types / Binary arithmetic / Numeral systems / Pointer / Integer overflow / Floating point / Binary-coded decimal / Power of two / Integer / C++ classes

FallUNIVERSITY OF CALIFORNIA Department of Electrical Engineering and Computer Sciences

DocID: 1phHB - View Document