Suchergebnisse - "Buffer overflow exploit"

  1. 1

    Buffer Overflow Exploit and Defensive Techniques von Desheng Fu, Feiyue Shi

    ISBN: 9781467330930, 1467330930
    ISSN: 2162-8998
    Veröffentlicht: IEEE 01.11.2012
    “… Buffer overflow attack is most common and dangerous attack method at present. So the analysis is useful in studying the principle of buffer overflow and buffer overflow exploits …”
    Volltext
    Tagungsbericht
  2. 2

    Architectural Support For Stack Buffer Overflow Exploit Prevention von Kao, Wen-Fu

    ISBN: 1267658754, 9781267658753
    Veröffentlicht: ProQuest Dissertations & Theses 01.01.2012
    “… Computing system security has drawn significant attention with devices deeply connected through the internet and increased popularity of ubiquitous computing …”
    Volltext
    Dissertation
  3. 3

    Amazon.com (AMZN) issued patent titled "Buffer overflow exploit detection"

    Veröffentlicht: Melbourne News Bites Pty Ltd 18.10.2019
    Veröffentlicht in News Bites - Computing & Information (18.10.2019)
    Volltext
    Newsletter
  4. 4

    Amazon Technologies Assigned Patent for Buffer Overflow Exploit Detection

    Veröffentlicht: Washington, D.C Targeted News Service 17.02.2018
    Veröffentlicht in Targeted News Service (17.02.2018)
    Volltext
    Newsletter
  5. 5
  6. 6
  7. 7

    Buffer Overflow Exploit Discovered In Android SDK von Singh, Saurabh

    Veröffentlicht: New Delhi Athena Information Solutions Pvt. Ltd 05.02.2014
    Veröffentlicht in EFYTimes.com (05.02.2014)
    “… According to droidsec the exploit has been confirmed on version 18.0.1 of the Android SDK platform tools on x86_64 Ubuntu Linux 12.04 …”
    Volltext
    Magazine Article
  8. 8
  9. 9

    Secure Patrol: Patrolling Against Buffer Overflow Exploits von Solanki, Jaydeep, Shah, Aenik, Das, Manik Lal

    ISSN: 1939-3555, 1939-3547
    Veröffentlicht: Philadelphia, PA Taylor & Francis 04.05.2014
    Veröffentlicht in Information security journal. (04.05.2014)
    “… Buffer overflow attacks are caused due to exploitation of stack or heap in computer memory. One of the targets behind buffer overflow attacks is the return …”
    Volltext
    Journal Article
  10. 10

    Analysis of Buffer Overflow Exploits and Prevention Strategies von Xu, Shu Xin, Chen, Jun Zhang

    ISBN: 9783038350125, 3038350125
    ISSN: 1660-9336, 1662-7482, 1662-7482
    Veröffentlicht: Zurich Trans Tech Publications Ltd 06.02.2014
    Veröffentlicht in Applied Mechanics and Materials (06.02.2014)
    “… With the rapid development of network technology and the emergence of a variety of applications,network security issues became the top priority of the network …”
    Volltext
    Journal Article
  11. 11

    Separated Control and Data Stacks to Mitigate Buffer Overflow Exploits von Kugler, Christopher, Müller, Tilo

    ISSN: 2032-9393, 2032-9393
    Veröffentlicht: Ghent European Alliance for Innovation (EAI) 05.10.2015
    Veröffentlicht in EAI endorsed transactions on security and safety (05.10.2015)
    “… Despite the fact that protection mechanisms like StackGuard, ASLR and NX are widespread, the development on new defense strategies against stack-based buffer …”
    Volltext
    Journal Article
  12. 12

    Buffer Overflow Exploits von Farooq, Khurram, Ugaili, Ayaz

    ISSN: 2616-7476, 1998-4162
    Veröffentlicht: Shaheed Zulfikar Ali Bhutto Institute of Science and Technology 31.12.2003
    Veröffentlicht in JISR Management and Social Sciences & Economics (31.12.2003)
    “… The focus of this Study is on providing an understanding of buffer overflows, the ways they are exploited, and ways to prevent attackers from abusing them …”
    Volltext
    Journal Article
  13. 13

    A metric for identifying system exploitation developed through a study in buffer overflow exploits von Allgeier, Michelle

    ISBN: 0542054760, 9780542054761
    Veröffentlicht: ProQuest Dissertations & Theses 01.01.2004
    “… Buffer overflow exploits are the most utilized method for gaining unauthorized control over a system …”
    Volltext
    Dissertation
  14. 14

    Return Oriented Programming - Exploit Implementation using Pwntools von Zala, Jayesh

    ISSN: 2456-3307, 2456-3307
    Veröffentlicht: 14.10.2020
    “… A decade ago, Return Oriented programming was designed to solve the buffer overflow exploit security mechanisms such as ASLR, DEP (or W?X …”
    Volltext
    Journal Article
  15. 15

    Entercept Fortifies Against ntdll.dll Buffer Overflow Exploits; Intrusion Prevention Leader Enables Customers To Combat New Strains of WebDAV von Business Editors/High-Tech Writers RSA Conference 2003

    Veröffentlicht: New York Business Wire 15.04.2003
    Veröffentlicht in Business Wire (15.04.2003)
    “… Entercept Security Technologies delivers the most proven host- based intrusion prevention software available. Using a unique combination of signatures and …”
    Volltext
    Newsletter
  16. 16

    McAfee Inc: McAfee, Inc. announces availability of industry's first anti-virus solution with intrusion prevention capabilities; McAfee VirusScan Enterprise 8.0i delivers advanced system protection against today's newest threats - including buffer-overflow exploits and blended attacks

    Veröffentlicht: Coventry Normans Media Ltd 01.09.2004
    Veröffentlicht in M2 Presswire (01.09.2004)
    “… ; McAfee VirusScan Enterprise 8.0i delivers advanced system protection against today's newest threats - including buffer-overflow exploits and blended attacks (C …”
    Volltext
    Newsletter
  17. 17
  18. 18

    Using a software exploit to image RAM on an embedded system von Rabaiotti, J.R., Hargreaves, C.J.

    ISSN: 1742-2876, 1873-202X
    Veröffentlicht: Kidlington Elsevier Ltd 01.05.2010
    Veröffentlicht in Digital investigation (01.05.2010)
    “… The paper describes how a buffer overflow exploit can be used in order to execute custom code written to create an image of the console's memory …”
    Volltext
    Journal Article
  19. 19
  20. 20

    Ανάπτυξη κώδικα εκμετάλλευσης αδυναμίας στο Metasploit von Νικολάου, Νικόλαος

    ISBN: 9798351404806
    Veröffentlicht: ProQuest Dissertations & Theses 01.01.2018
    “… Στην παρούσα διπλωματική εργασία πραγματοποιείται ανάλυση της αρχιτεκτονικής του Metasploit. Το Metasploit Framework αποτελεί στις μέρες μας το πιο σημαντικό …”
    Volltext
    Dissertation