Suchergebnisse - "Buffer overflow exploit"
-
1
Buffer Overflow Exploit and Defensive Techniques
ISBN: 9781467330930, 1467330930ISSN: 2162-8998Veröffentlicht: IEEE 01.11.2012Veröffentlicht in 2012 Fourth International Conference on Multimedia Information Networking and Security (01.11.2012)“… Buffer overflow attack is most common and dangerous attack method at present. So the analysis is useful in studying the principle of buffer overflow and buffer overflow exploits …”
Volltext
Tagungsbericht -
2
Architectural Support For Stack Buffer Overflow Exploit Prevention
ISBN: 1267658754, 9781267658753Veröffentlicht: ProQuest Dissertations & Theses 01.01.2012“… Computing system security has drawn significant attention with devices deeply connected through the internet and increased popularity of ubiquitous computing …”
Volltext
Dissertation -
3
Amazon.com (AMZN) issued patent titled "Buffer overflow exploit detection"
Veröffentlicht: Melbourne News Bites Pty Ltd 18.10.2019Veröffentlicht in News Bites - Computing & Information (18.10.2019)Volltext
Newsletter -
4
Amazon Technologies Assigned Patent for Buffer Overflow Exploit Detection
Veröffentlicht: Washington, D.C Targeted News Service 17.02.2018Veröffentlicht in Targeted News Service (17.02.2018)Volltext
Newsletter -
5
US Patent Issued to AMAZON TECHNOLOGIES on Oct. 15 for "Buffer overflow exploit detection" (Canadian Inventor)
Veröffentlicht: Washington, D.C HT Digital Streams Limited 16.10.2019Veröffentlicht in US Fed News Service, Including US State News (16.10.2019)Volltext
Newsletter -
6
US Patent Issued to AMAZON TECHNOLOGIES on Feb. 13 for "Buffer overflow exploit detection" (Nevada Inventor)
Veröffentlicht: Washington, D.C HT Digital Streams Limited 13.02.2018Veröffentlicht in US Fed News Service, Including US State News (13.02.2018)Volltext
Newsletter -
7
Buffer Overflow Exploit Discovered In Android SDK
Veröffentlicht: New Delhi Athena Information Solutions Pvt. Ltd 05.02.2014Veröffentlicht in EFYTimes.com (05.02.2014)“… According to droidsec the exploit has been confirmed on version 18.0.1 of the Android SDK platform tools on x86_64 Ubuntu Linux 12.04 …”
Volltext
Magazine Article -
8
VoIP Hack Puts PCs In Peril; A security researcher says attacking VoIP devices over SIP can be difficult, but many of the devices have embedded Web servers that can be hacked using a buffer overflow exploit
ISSN: 8750-6874Veröffentlicht: UBM LLC 16.10.2007Veröffentlicht in InformationWeek (Manhasset, N.Y.) (16.10.2007)Volltext
Magazine Article -
9
Secure Patrol: Patrolling Against Buffer Overflow Exploits
ISSN: 1939-3555, 1939-3547Veröffentlicht: Philadelphia, PA Taylor & Francis 04.05.2014Veröffentlicht in Information security journal. (04.05.2014)“… Buffer overflow attacks are caused due to exploitation of stack or heap in computer memory. One of the targets behind buffer overflow attacks is the return …”
Volltext
Journal Article -
10
Analysis of Buffer Overflow Exploits and Prevention Strategies
ISBN: 9783038350125, 3038350125ISSN: 1660-9336, 1662-7482, 1662-7482Veröffentlicht: Zurich Trans Tech Publications Ltd 06.02.2014Veröffentlicht in Applied Mechanics and Materials (06.02.2014)“… With the rapid development of network technology and the emergence of a variety of applications,network security issues became the top priority of the network …”
Volltext
Journal Article -
11
Separated Control and Data Stacks to Mitigate Buffer Overflow Exploits
ISSN: 2032-9393, 2032-9393Veröffentlicht: Ghent European Alliance for Innovation (EAI) 05.10.2015Veröffentlicht in EAI endorsed transactions on security and safety (05.10.2015)“… Despite the fact that protection mechanisms like StackGuard, ASLR and NX are widespread, the development on new defense strategies against stack-based buffer …”
Volltext
Journal Article -
12
Buffer Overflow Exploits
ISSN: 2616-7476, 1998-4162Veröffentlicht: Shaheed Zulfikar Ali Bhutto Institute of Science and Technology 31.12.2003Veröffentlicht in JISR Management and Social Sciences & Economics (31.12.2003)“… The focus of this Study is on providing an understanding of buffer overflows, the ways they are exploited, and ways to prevent attackers from abusing them …”
Volltext
Journal Article -
13
A metric for identifying system exploitation developed through a study in buffer overflow exploits
ISBN: 0542054760, 9780542054761Veröffentlicht: ProQuest Dissertations & Theses 01.01.2004“… Buffer overflow exploits are the most utilized method for gaining unauthorized control over a system …”
Volltext
Dissertation -
14
Return Oriented Programming - Exploit Implementation using Pwntools
ISSN: 2456-3307, 2456-3307Veröffentlicht: 14.10.2020Veröffentlicht in International Journal of Scientific Research in Computer Science, Engineering and Information Technology (14.10.2020)“… A decade ago, Return Oriented programming was designed to solve the buffer overflow exploit security mechanisms such as ASLR, DEP (or W?X …”
Volltext
Journal Article -
15
Entercept Fortifies Against ntdll.dll Buffer Overflow Exploits; Intrusion Prevention Leader Enables Customers To Combat New Strains of WebDAV
Veröffentlicht: New York Business Wire 15.04.2003Veröffentlicht in Business Wire (15.04.2003)“… Entercept Security Technologies delivers the most proven host- based intrusion prevention software available. Using a unique combination of signatures and …”
Volltext
Newsletter -
16
McAfee Inc: McAfee, Inc. announces availability of industry's first anti-virus solution with intrusion prevention capabilities; McAfee VirusScan Enterprise 8.0i delivers advanced system protection against today's newest threats - including buffer-overflow exploits and blended attacks
Veröffentlicht: Coventry Normans Media Ltd 01.09.2004Veröffentlicht in M2 Presswire (01.09.2004)“… ; McAfee VirusScan Enterprise 8.0i delivers advanced system protection against today's newest threats - including buffer-overflow exploits and blended attacks (C …”
Volltext
Newsletter -
17
Entercept Fortifies Against ntdll.dll Buffer Overflow Exploits; Intrusion Prevention Leader Enables Customers To Combat New Strains of WebDAV
Veröffentlicht: Business Wire, Inc 15.04.2003Veröffentlicht in Business Wire (15.04.2003)Volltext
Newspaper Article -
18
Using a software exploit to image RAM on an embedded system
ISSN: 1742-2876, 1873-202XVeröffentlicht: Kidlington Elsevier Ltd 01.05.2010Veröffentlicht in Digital investigation (01.05.2010)“… The paper describes how a buffer overflow exploit can be used in order to execute custom code written to create an image of the console's memory …”
Volltext
Journal Article -
19
McAfee, Inc. announces availability of industry's first anti-virus solution with intrusion prevention capabilities; McAfee VirusScan Enterprise 8.0i delivers advanced system protection against today's newest threats - including buffer-overflow exploits and blended attacks
Veröffentlicht: Normans Media Ltd 01.09.2004Veröffentlicht in M2 Presswire (01.09.2004)Volltext
Newspaper Article -
20
Ανάπτυξη κώδικα εκμετάλλευσης αδυναμίας στο Metasploit
ISBN: 9798351404806Veröffentlicht: ProQuest Dissertations & Theses 01.01.2018“… Στην παρούσα διπλωματική εργασία πραγματοποιείται ανάλυση της αρχιτεκτονικής του Metasploit. Το Metasploit Framework αποτελεί στις μέρες μας το πιο σημαντικό …”
Volltext
Dissertation

