DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Heap overflow
Heap overflow
A Buffer Overflow Study
Chapter 10 Buffer Overflow Buffer Overflow
Towards Efficient Heap Overflow Discovery
Comprehensively and Efficiently Protecting the Heap ∗
Semi-Synchronized Non-Blocking Concurrent Kernel Cruising
An Examination of the Generic Memory Corruption Exploit Prevention
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities
X41 D-SEC Gmbh Dennewartstr
IIS Security Vulnerabilities 6
Owasp Testing Guide
Linux Exploit Mitigation
Freebsd Kernel Stack and Heap Exploitation Abstract Introduction
Kernel-Assisted Protection Against Heap Overflows
A Guide to Kernel Exploitation Attacking the Core (2011
A Decade of Linux Kernel Vulnerabilities, Their Mitigation and Open Problems
An Efficient End-To-End Solution Against Heap Buffer Overflows
Instituto Tecnológico Y De Estudios Superiores De Monterrey a Unified
Black Hat USA 2012 Program Guide
Top View
CS 356 – Lecture 21 and 22 Buffer Overflow
Large Memory Management Vulnerabilities
Defense in Depth: Protecting Against Zero-Day Attacks
Understanding the Low Fragmentation Heap
Understanding Common Security Exploits
Real-World Buffer Overflow Protection for Userspace & Kernelspace
Buffer Overflows in the Microsoft Windows® Environment
Heap Overflows and Double-Free Attacks
History and Current State of Heap Exploit
Open Jun Dissertation Final.Pdf
Metamorphic Viruses with Built-In Buffer Overflow
A Comparison of Buffer Overflow Prevention Implementations and Weaknesses
Defeating Microsoft Windows XP SP2 Heap Protection and DEP Bypass
Buffer Overflow
Analysis of ROP Attack on Grsecurity / Pax Linux Kernel Security Variables
Dieharder: Securing the Heap∗ Gene Novark Emery D
Different Techniques to Prevent Buffer Overflow
Memory Corruption Attacks the (Almost) Complete History