Search Results - "Address Space Layout Randomization"
-
1
Authors:
Source: IEEE Access, Vol 13, Pp 102784-102802 (2025)
-
2
Authors: et al.
Contributors: et al.
Subject Terms: address space layout randomization (aslr), memory exploitation mitigations, operating systems security
Relation: info:eu-repo/semantics/altIdentifier/isbn/9798400706363; info:eu-repo/semantics/altIdentifier/wos/WOS:001436367300094; ispartofbook:Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security; ACM SIGSAC Conference on Computer and Communications Security; firstpage:1360; lastpage:1374; numberofpages:15; https://hdl.handle.net/11311/1278911; https://doi.org/10.1145/3658644.3690239
-
3
Authors:
Source: Madani: Jurnal Ilmiah Multidisiplin; Vol 2, No 8 (2024): September; 87-94
Subject Terms: Buffer Overflow, Address Space Layout Randomization, computer aplication systems, operating system
File Description: application/pdf
Relation: https://jurnal.penerbitdaarulhuda.my.id/index.php/MAJIM/article/view/2633/2725; https://jurnal.penerbitdaarulhuda.my.id/index.php/MAJIM/article/view/2633
-
4
Authors:
Subject Terms: ASLR, address space layout randomization, buffer overflow, protection mechanisms, vulnerability, security experiment, experiment
File Description: application/pdf
-
5
Authors: CONG Mou, ZHANG Ping, WANG NING
Source: Jisuanji gongcheng, Vol 47, Iss 8, Pp 177-182 (2021)
Subject Terms: kernel address space layout randomization (kaslr), prefetch instruction, timing attack, kernel, cache miss, Computer engineering. Computer hardware, TK7885-7895, Computer software, QA76.75-76.765
File Description: electronic resource
-
6
Authors: et al.
Source: Energies, Vol 13, Iss 6, p 1332 (2020)
Subject Terms: address space layout randomization (aslr), rerandomization, code-reuse attack, return-oriented programming (rop), seamless memory randomization, Technology
Relation: https://www.mdpi.com/1996-1073/13/6/1332; https://doaj.org/toc/1996-1073; https://doaj.org/article/76d4e8583dff4b359444c3ce0d9bd14d
-
7
Authors:
Contributors:
Subject Terms: Kernel address space layout randomization, KASLR, Side-channel attack, Advanced vector extensions, AVX
Relation: COMPUTERS & SECURITY, v.134; http://hdl.handle.net/10203/313910; 1928; 131441; 001080545800001
-
8
Authors:
Source: Tongxin xuebao, Vol 35, Pp 20-31 (2014)
Subject Terms: software vulnerability, exploit, attack detection, address space layout randomization, data execution pro-tection, Telecommunication, TK5101-6720
File Description: electronic resource
Relation: https://doaj.org/toc/1000-436X
-
9
Authors:
Source: 2013 IEEE Symposium on Security and Privacy : SP 2013; Berkeley [i.e. San Francisco], California, USA, 19 - 22 May 2013
Subject Terms: ddc:004, Address Space Layout Randomization, Exploit Mitigation, Kernel, Timing Attacks, Vulnerabilities
File Description: 191–205
Relation: urn:isbn:978-0-7695-4977-4
-
10
Authors:
Contributors:
Source: DTIC
Subject Terms: Computer Systems Management and Standards, HACKING(COMPUTER SECURITY), COMPUTER PROGRAMS, DETECTION, THESES, MEMORY CORRUPTION ATTACKS, GS, DATA EXECUTION PREVENTION, ADDRESS SPACE LAYOUT RANDOMIZATION, ISV(INDEPENDENT SOFTWARE VENDORS), SAFESEH, STRUCTURED EXCEPTION HANDLING, EXPLOIT MITIGATIONS, THIRD-PARTY APPLICATIONS, BUFFER OVERFLOW
File Description: text/html
-
11
Authors:
Contributors:
Subject Terms: Address Space Layout Randomization, attacks, hash, malware, Smartphone, Symbian
File Description: application/pdf
-
12
Authors:
Source: DTIC
Index Terms: Computer Systems Management and Standards, HACKING(COMPUTER SECURITY), COMPUTER PROGRAMS, DETECTION, THESES, MEMORY CORRUPTION ATTACKS, GS, DATA EXECUTION PREVENTION, ADDRESS SPACE LAYOUT RANDOMIZATION, ISV(INDEPENDENT SOFTWARE VENDORS), SAFESEH, STRUCTURED EXCEPTION HANDLING, EXPLOIT MITIGATIONS, THIRD-PARTY APPLICATIONS, BUFFER OVERFLOW, Text
-
13
Authors: et al.
-
14
Authors: et al.
Full Text Finder
Nájsť tento článok vo Web of Science