DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Heap spraying
Heap spraying
Heap Feng Shui in Javascript
A Defense Against Heap-Spraying Code Injection Attacks
Jitdefender: a Defense Against JIT Spraying Attacks
Fighting the War in Memory
Flashdetect: Actionscript 3 Malware Detection
Towards Automated Generation of Exploitation Primitives for Web
The Art of Reverse-Engineering Flash Exploits
[email protected]
Control Hijacking Attacks
Adobe Flash Player Integer Overflow Vulnerability Analysis
(Offensive Technologies) OS Vulnerabilities Project
Heap Spraying Exploit
Preventing Use-After-Free with Dangling Pointers Nullification
Heap-Based Buffer Overflow Vulnerability in Adobe Flash Player
Exploiting Memory Allocation Granularity in Heap-Spraying Attacks
1 Understanding Heap-Spraying Attacks 2 Introduction 3 Adversary
Dieharder: Securing the Heap
Heap Feng Shui in Javascript
UNIVERSITY of CALIFORNIA, SAN DIEGO JIT Spraying Threats on ARM and Defense by Diversification a Dissertation Submitted in Parti
Top View
An NCC Group Publication Exploiting CVE-2014-0282
Detecting Web Browser Heap Corruption Attacks Stephan Chenette Moti Joseph Websense Security Labs Who We Are…
CSE 40567 / 60567: Computer Security
Bypassing Memory Protections: the Future of Exploitation
Corelan Team :: Knowledge Is Not an Object, It's a Flow
Heap Spraying – Activex Controls Under Attack
An In-Lined Monitoring Approach to Flash App Security
Buffer Overflows in the Microsoft Windows® Environment
(12) Patent Application Publication (10) Pub. No.: US 2009/0300764 A1 FREEMAN (43) Pub
Interpreter Exploitation Dionysus Blazakis Independent Security Evaluators Baltimore, MD 21209
[email protected]
On the Analysis of Byte-Granularity Heap Randomization
Stagefright: an Android Exploitation Case Study
Malicious Javascript Detection by Features Extraction
Stack & Heap Overflows
Dieharder: Securing the Heap∗ Gene Novark Emery D
Understanding the Costs and Benefits of JIT Spraying Mitigations
A Defense Against Heap-Spraying Code Injection Attacks
Analysis and Detection of Heap-Based Malwares Using Introspection in a Virtualized Environment