Search

Your search keyword '"Address space layout randomization"' showing total 37 results

Search Constraints

Start Over You searched for: Descriptor "Address space layout randomization" Remove constraint Descriptor: "Address space layout randomization" Topic exploit Remove constraint Topic: exploit
37 results on '"Address space layout randomization"'

Search Results

1. Exploit detection based on illegal control flow transfers identification

2. Stopping Memory Disclosures via Diversification and Replicated Execution

3. Address Space Layout Randomization Comparative Analysis on Windows 10 and Ubuntu 18.04 LTS

4. ARG: Automatic ROP Chains Generation

5. Exploiting stack-based buffer overflow using modern day techniques

6. An Automatic Evaluation Approach for Binary Software Vulnerabilities with Address Space Layout Randomization Enabled

7. BadASLR: Exceptional Cases of ASLR Aiding Exploitation

8. A Review of Memory Errors Exploitation in x86-64

9. TagBleed: Breaking KASLR on the Isolated Kernel Address Space using Tagged TLBs

10. Badaslr: Exceptional cases of ASLR aiding exploitation

11. Automatic Exploit Generation for Buffer Overflow Vulnerabilities

12. Dynamic Loader Oriented Programming on Linux

13. Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables

14. HAIT: Heap Analyzer with Input Tracing

15. ASLR and ROP Attack Mitigations for ARM-Based Android Devices

16. LAZARUS: Practical Side-Channel Resilient Kernel-Space Randomization

17. A Function Level Randomization Technique to Mitigate ROP Attacks

18. Control-flow integrity principles, implementations, and applications

19. Short Paper

20. Securing Legacy Software against Real-World Code-Reuse Exploits

21. Malicious PDF Documents Explained

22. Information Leaks Without Memory Disclosures

23. Hacking Blind

24. Security through Emulation-Based Processor Diversification

25. A Static Recognition Mechanism for Indirect Call Based on Static Single Assignment

26. Measuring ASLR implementations on modern operating systems

27. Practical Control Flow Integrity and Randomization for Binary Executables

28. Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization

29. String oriented programming

30. Applying POMDP to moving target optimization

31. ILR: Where'd My Gadgets Go?

32. OverCovert: Using Stack-Overflow Software Vulnerability to Create a Covert Channel

33. Surgically Returning to Randomized lib(c)

34. Breaking the memory secrecy assumption

35. Control-flow integrity

36. On the effectiveness of address-space randomization

37. Transparent runtime randomization for security

Catalog

Books, media, physical & digital resources