Suchergebnisse - layout buffer overflow
-
1
-
2
Autoren:
Quelle: Journal of Systems Research. 3(1)
Schlagwörter: security, buffer overflow
Dateibeschreibung: application/pdf
-
3
Autoren:
Quelle: 2014 International Conference on Information Technology. :184-189
Schlagwörter: 2. Zero hunger, 0211 other engineering and technologies, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
-
4
-
5
Autoren: Lindblom, Henrik
Index Begriffe: Computer Security, Operating Systems, Control-flow hijack attacks, Buffer Overflow, Stack, DOS, Computer Sciences, Datavetenskap (datalogi), Student thesis, info:eu-repo/semantics/bachelorThesis, text
URL:
http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-214298
UMNAD ; 1437 -
6
Autoren:
Schlagwörter: ASLR, address space layout randomization, buffer overflow, protection mechanisms, vulnerability, security experiment, experiment
Dateibeschreibung: application/pdf
-
7
Autoren: Resch, Cheryl Lynn
Quelle: Proceedings of the ASEE Annual Conference & Exposition; 2024, p1-20, 20p
-
8
Autoren: et al.
Index Begriffe: buffer overflow, return oriented programming, ROP, gadget, return instruction pointer, stack canary, obfuscation, binary, Thesis
-
9
Autoren: et al.
Quelle: Applied Sciences, Vol 12, Iss 13, p 6702 (2022)
Schlagwörter: buffer overflow attacks, CVE, mitigation techniques, hardware based mitigation approaches, Technology, Engineering (General). Civil engineering (General), TA1-2040, Biology (General), QH301-705.5, Physics, QC1-999, Chemistry, QD1-999
Dateibeschreibung: electronic resource
-
10
Autoren:
Quelle: Database Systems Journal; 2020, Vol. 11 Issue 3, p99-108, 10p
Schlagwörter: COMBINED sewer overflows, DESIGN protection, SECURITY systems
-
11
Autoren:
Quelle: Procedia Computer Science. 160:9-14
Schlagwörter: 0103 physical sciences, 01 natural sciences, 3. Good health
-
12
Autoren:
Quelle: Cybersecurity (2523-3246); 7/18/2024, Vol. 7 Issue 1, p1-15, 15p
Schlagwörter: EVALUATORS, PROOF of concept
-
13
Autoren: Resch, Cheryl Lynn
Quelle: Proceedings of the ASEE Annual Conference & Exposition; 2023, p1-20, 20p
-
14
Autoren:
Quelle: 2020 4th Annual International Conference on Data Science and Business Analytics (ICDSBA). :29-31
-
15
Autoren: et al.
Quelle: 2024 IEEE Symposium on Security and Privacy (SP)
Schlagwörter: memory safety, MTE, memory tagging extension, buffer overflow
-
16
Autoren: et al.
Quelle: Applied Sciences (2076-3417); Jul2022, Vol. 12 Issue 13, pN.PAG-N.PAG, 31p
Schlagwörter: APPLICATION software, COMPILERS (Computer programs), SYSTEMS software, AUTHORSHIP
-
17
Autoren: et al.
Quelle: 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C). :463-468
Schlagwörter: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
-
18
Autoren: et al.
Quelle: Cybersecurity (2523-3246); 9/6/2023, Vol. 6 Issue 1, p1-16, 16p
-
19
Autoren: et al.
Quelle: Journal of Computer Science & Technology (10009000); Nov2020, Vol. 35 Issue 6, p1406-1427, 22p
Schlagwörter: COMBINED sewer overflows, WARNINGS, SOURCE code
-
20
Autoren:
Quelle: Procedia Computer Science. 2019, Vol. 160, p9-14. 6p.
Schlagwörter: Leakage, Design protection, Computer security vulnerabilities, Security systems
Nájsť tento článok vo Web of Science
Full Text Finder